Author of the publication

The Trellis Security Infrastructure: A Layered Approach to Overlay Metacomputers .

, , , , , , , , , , , and . HPCS, page 109-117. University of Manitoba, Department of Computer Science, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving 7x7 Hex with domination, fill-in, and virtual connections., , , , , and . Theor. Comput. Sci., 349 (2): 123-139 (2005)A Tool for the Direct Assessment of Poker Decisions., and . J. Int. Comput. Games Assoc., 29 (3): 119-142 (2006)Optimal Unbiased Estimators for Evaluating Agent Performance., , , , and . AAAI, page 573-579. AAAI Press, (2006)Solving 7x7 Hex: Virtual Connections and Game-State Reduction., , , , , and . ACG, volume 263 of IFIP, page 261-278. Kluwer, (2003)A Practical Use of Imperfect Recall., , , , , and . SARA, AAAI, (2009)The Trellis Security Infrastructure: A Layered Approach to Overlay Metacomputers ., , , , , , , , , and 2 other author(s). HPCS, page 109-117. University of Manitoba, Department of Computer Science, (2004)The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems., , , , , , and . J. Parallel Distributed Comput., 66 (9): 1181-1188 (2006)A demonstration of the Polaris poker system., , , , , , , , , and 6 other author(s). AAMAS (2), page 1391-1392. IFAAMAS, (2009)