Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using branch-and-bound algorithms to obtain suboptimal solutions., , , and . Z. Oper. Research, 27 (1): 177-202 (1983)Evaluation of the File Redundancy in Distributed Database Systems., , , and . IEEE Trans. Software Eng., 11 (2): 199-205 (1985)Tree Algorithms for Random Access Channels in Local Area Networks., , , and . ICC, page 620-624. IEEE, (1986)Performance Evaluation of Prioritized Token Ring Protocols, , , and . page 3.1-3.7. (1985)File Redundancy Issues in Distributed Database Systems., , , and . VLDB, page 275-277. Morgan Kaufmann, (1983)Multiversion Concurrency Control Scheme for a Distributed Database System - A Trial to Break Concurrent Update of Redundant Copies., , and . RIMS Symposia on Software Science and Engineering, volume 220 of Lecture Notes in Computer Science, page 158-180. Springer, (1984)Multi-version Concurrency Control Scheme for a Database System., , and . J. Comput. Syst. Sci., 29 (2): 207-224 (1984)Throughput analysis of reservation protocols with tree-type reservation channel., , and . Syst. Comput. Jpn., 18 (3): 79-91 (1987)Throughput analysis of Tree-Type protocols., , and . Syst. Comput. Jpn., 17 (6): 40-49 (1986)Performance analysis of the acknowledging ethernet., , and . Syst. Comput. Jpn., 17 (8): 80-88 (1986)