Author of the publication

Divide and Conquer Technique for Network Fault Management.

, , , , , and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 675-687. Chapman & Hall, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 53-67 (2013)Algorithm for Automatic Brain-Shift Detection Using the Distance Between Feature Descriptors., , , , , and . HCI (2), volume 13303 of Lecture Notes in Computer Science, page 376-387. Springer, (2022)Homomorphic encryption based cancelable biometrics secure against replay and its related attack., , , , and . ISITA, page 421-425. IEEE, (2012)Development of an Algorithm to Artificially Create Virtual Brain Deformations for Brain DICOM., , , , and . HCI (2), volume 13303 of Lecture Notes in Computer Science, page 388-402. Springer, (2022)Divide and Conquer Technique for Network Fault Management., , , , , and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 675-687. Chapman & Hall, (1997)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)DICOM Depth Image Generation using GPGPU for Fast Position and Orientation Estimation on Liver Surgery Support System., , , , and . TENCON, page 356-360. IEEE, (2019)