Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System., and . J. Softw., 2 (3): 78-86 (2007)Vision-Based Personal Safety Messages (PSMs) Generation for Connected Vehicles., , , , , and . IEEE Trans. Veh. Technol., 69 (9): 9402-9416 (2020)Teaching Grid Computing: Topics, Exercises, and Experiences., and . IEEE Trans. Educ., 50 (1): 3-9 (2007)OptZConfig: Efficient Parallel Optimization of Lossy Compression Configuration., , , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 3505-3519 (2022)Proactive Query Expansion for Streaming Data Using External Sources., , , , and . IEEE Big Data, page 701-708. IEEE, (2022)Accelerating Text Mining Using Domain-Specific Stop Word Lists., , , , and . IEEE BigData, page 2639-2648. IEEE, (2020)Defensive maneuver cyber platform modeling with Stochastic Petri Nets., , and . CollaborateCom, page 531-538. ICST / IEEE, (2014)A Communication Staging Technique for Network Cache Interconnected Clusters., , , and . IWCC, page 55-62. IEEE Computer Society, (1999)The Effects of Thread Placement on the KSR1., , , , and . IPPS, page 618-624. IEEE Computer Society, (1994)Addressing the Challenges of Executing a Massive Computational Cluster in the Cloud., , , , , , and . CCGrid, page 253-262. IEEE Computer Society, (2018)