Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overlaying Technique for Solving Linear Equations in Real-Time Computing.. IEEE Trans. Computers, 42 (5): 513-517 (1993)A combinatorial architecture for instruction-level parallelism., and . Microprocess. Microsystems, 22 (1): 23-31 (1998)Construction of FuzzyFind Dictionary using Golay Coding Transformation for Searching Applications., , , , , and . CoRR, (2015)Novel Metaknowledge-Based Processing Technique for Multimediata Big Data Clustering Challenges., , , and . BigMM, page 204-207. IEEE Computer Society, (2015)Formation of Artificial and Natural Intelligence in Big Data Environment.. Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Sustainability Problems and a Novelty in the Concept of Energy.. Cybersecurity Systems for Human Cognition Augmentation, volume 61 of Advances in Information Security, Springer, (2014)Challenges to Build Web-Based Scientific Databases., , , , , and . International Conference on Internet Computing, page 248-253. CSREA Press, (2004)A bit-counting algorithm using the frequency division principle., , and . Softw. Pract. Exp., 30 (14): 1531-1540 (2000)MESM and the Beginning of the Computer Era in the Soviet Union., , and . IEEE Ann. Hist. Comput., 28 (3): 4-16 (2006)Reversing the Error-Correction Scheme for a Fault-Tolerant Indexing., and . Data Compression Conference, page 527. IEEE Computer Society, (1998)