Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security for libraries.. IRMA Conference, page 558-560. IDEA Group Publishing, (2000)Performance analysis and tuning for clusters with ccNUMA nodes for scientific coputing - a case study., , , , and . Comput. Syst. Sci. Eng., (2009)Experimental Evaluation of Emerging Multi-core Architectures., , , and . IPDPS, page 1-6. IEEE, (2007)Open Source Software Development and Lotka's Law: Bibliometric Patterns in Programming., , and . J. Assoc. Inf. Sci. Technol., 54 (2): 169-178 (2003)Metric Multidimensional Information Space.. TREC, volume 500-238 of NIST Special Publication, National Institute of Standards and Technology (NIST), (1996)Logistic Regression Merging of Amberfish and Lucene Multisearch Results., and . TREC, volume 500-266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2005)Towards Grid-Based Information Retrieval.. TREC, volume 500-261 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2004)Hardware acceleration prospects and challenges for high performance computing.. AICCSA, page 841-844. IEEE Computer Society, (2009)Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search., and . HICSS, page 1-6. IEEE Computer Society, (2010)Secure Information Sharing and Information Retrieval Infrastructure with GridIR., and . ISI, volume 2665 of Lecture Notes in Computer Science, page 389. Springer, (2003)