Author of the publication

Developing network configuration management database system and its application - data federation for network management.

, , and . Telecommun. Syst., 52 (2): 993-1000 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing network configuration management database system and its application - data federation for network management., , and . Telecommun. Syst., 52 (2): 993-1000 (2013)Modeling attacks against device authentication using CMOS image sensor PUF., , , and . IEICE Electron. Express, 18 (7): 20210058 (2021)Analysis of ISO 6983 NC Data Based on ISO 14649 CNC Data Model., , and . PROLAMAT, volume 207 of IFIP, page 109-114. Springer, (2006)Analyzing The Tradeoff Between Throughput and Latency in Multicore Scalable In-Memory Database Systems., , and . APSys, page 17:1-17:9. ACM, (2016)GLoop: an event-driven runtime for consolidating GPGPU applications., , , and . SoCC, page 80-93. ACM, (2017)A fully meshed backbone network for data-intensive sciences and SDN services., , , , , , , , , and 1 other author(s). ICUFN, page 909-911. IEEE, (2016)User-level disk-bandwidth control for resource-borrowing network applications., and . NOMS, IEEE, (2006)On the performance of downstream traffic distribution scheme in fiber-wireless networks., , , , , and . WCNC, page 434-439. IEEE, (2011)A nonlinear finite element simulation of balloon expandable stent for assessment of plaque vulnerability inside a stenotic artery., , , and . Medical Biol. Eng. Comput., 52 (7): 589-599 (2014)Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks., , and . IEICE Trans. Inf. Syst., 105-D (11): 1890-1899 (November 2022)