Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPECsip infrastructure and application benchmarks., , , , , , , and . ICPE, page 425-426. ACM, (2013)Policy management for network-based intrusion detection and prevention., and . NOMS (2), page 219-232. IEEE, (2004)End-to-End Java Security Performance Enhancements for Oracle SPARC Servers., , , , and . ICPE, page 159-166. ACM, (2016)Scaling Java Virtual Machine on a many-core system., , and . ISIC, page 336-339. IEEE, (2014)Communication Middleware and Software for QoS Control in Distributed Real-Time EnvironmentsSpecifically, we consider the following innovative research components., , and . COMPSAC, page 558-564. IEEE Computer Society, (1997)Optimizing JMS Performance for Cloud-Based Application Servers., and . IEEE CLOUD, page 828-835. IEEE Computer Society, (2012)Routing in quasi torus networks., and . Networks, 28 (4): 195-209 (1996)Irregular Torus Networks: Deadlock Avoidance and Throughput Analysis., and . INFOCOM, page 312-321. IEEE Computer Society, (1993)i-MIRROR: A Software Managed Die-Stacked DRAM-Based Memory Subsystem., , , and . SBAC-PAD, page 82-89. IEEE Computer Society, (2015)Accelerating Java Streams With A Data AnalyticsHardware Accelerator., , , , , , and . ICPE, page 157-158. ACM, (2017)