Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel processing of graph reachability in databases., , , , and . Int. J. Parallel Program., 21 (4): 269-302 (1992)A Study on the Design of Large-Scale Mobile Recording and Tracking Systems., and . HICSS (7), page 701-711. IEEE Computer Society, (1998)Wireless media access control for highly mobile information servers: simulation and performance evaluation., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 1 (2): 17-24 (1997)Mining Audit Data to Build Intrusion Detection Models., , and . KDD, page 66-72. AAAI Press, (1998)Improving Performance of Adaptive Media Access Control Protocols for High-Density Wireless Networks., and . ISPAN, page 316-321. IEEE Computer Society, (1999)A Methodology for Evaluating Parallel Graph Algorithms and Its Application to Single Source Reachability., , , , and . PDIS, page 243-250. IEEE Computer Society, (1993)Multiwavelength Analysis for a First-order Consecutive Reaction., and . Comput. Chem., 16 (3): 239-242 (1992)Performance Evaluation of Adaptive Media Access Control Protocols for Pervasive Wireless Networks., and . J. Interconnect. Networks, 3 (3-4): 253-272 (2002)Mining in a Data-Flow Environment: Experience in Network Intrusion Detection., , and . KDD, page 114-124. ACM, (1999)Adaptive Intrusion Detection: A Data Mining Approach., , and . Artif. Intell. Rev., 14 (6): 533-567 (2000)