Author of the publication

A Fair Bulk Data Transmission Protocol in Grid Environments.

, , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 937-940. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganalysis Based on Differential Statistics., , , , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 224-240. Springer, (2006)A Fair Bulk Data Transmission Protocol in Grid Environments., , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 937-940. Springer, (2005)An Efficient Mobility Management Scheme for Two-Level HMIPv6 Networks., , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 156-159. Springer, (2006)A Novel Feature Selection Approach and Feature Weight Adjustment Technique in Text Classification., and . SERA, page 41-44. IEEE Computer Society, (2009)Extending intransitive noninterference with probabilities in information flow security., , and . IMSCCS, page 337-343. IEEE Computer Society, (2007)A Swarm-Inspired Resource Distribution for SMT Processors., , , , and . BIONETICS, page 13. ICST / ACM, (2008)Design of A Novel Asynchronous Reconfigurable Architecture for Cryptographic Applications., , , and . IMSCCS (2), page 751-757. IEEE Computer Society, (2006)0-7695-2581-4.A Dissipative Resource Distribution policy for SMT processors., , , , and . IPDPS, page 1-8. IEEE, (2008)Virus Scan System Based on Hardware-Acceleration., , and . IMSCCS, page 344-351. IEEE Computer Society, (2007)The Research on Definition of Multilevel Security Based on the Construction of Covert Channels., and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 157-162. Springer, (2011)