Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Mappings among Interconnection Networks for Performance Evaluation., and . ICDCS, page 16-25. IEEE Computer Society, (1986)Mapping a Chain Task to Chained Processors., , and . Inf. Process. Lett., 44 (3): 141-148 (1992)3 Parallel computer architectures., and . Computational Statistics, volume 9 of Handbook of Statistics, North-Holland, (1993)Study of link congestion during I/O transfers in 2-D meshes using wormhole routing., , and . CATA, page 186-189. ISCA, (2000)Providing secure execution environments with a last line of defense against Trojan circuit attacks., , , and . Comput. Secur., 28 (7): 660-669 (2009)Parallel real-time systems: formal specification., , and . HiPC, page 186-191. IEEE Computer Society, (1997)Transform-Based Indexing of Audio Data for Multimedia Databases., , , and . ICMCS, page 211-218. IEEE Computer Society, (1997)Compiler-Directed Region-Based Security for Low-Overhead Software Protection., , , and . DASC, page 47-54. IEEE Computer Society, (2007)Mapping binary precedence trees to hypercubes and meshes., and . SPDP, page 838-841. IEEE Computer Society, (1990)Geometric Chemotaxis: A Biologically-Inspired Framework for a Class of Wireless Coverage Problems., , and . Ad Hoc Sens. Wirel. Networks, (2006)