Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GröBner-Shirshov Bases for L-Algebras., , and . Int. J. Algebra Comput., 23 (3): 547-572 (2013)The Alternating Direction Iterative of Axial Symmetric Electrostatic Field without Charge Current Distribution., , , , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 309-313. Springer, (2011)The Alternating Direction Iterative of Axial Symmetrical and Static Magnetic Field without Charge and Current Distribution., , , , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 405-410. Springer, (2011)Myrinet communication., , , , and . IEEE Micro, 18 (1): 50-52 (1998)UTLB: A Mechanism for Address Translation on Network Interfaces., , , , and . ASPLOS, page 193-204. ACM Press, (1998)Tangible security for mobile devices., and . MobiQuitous, ICST / ACM, (2008)Trading Capacity for Performance in a Disk Array., , , , , , and . OSDI, page 243-258. USENIX Association, (2000)Data distribution strategies for high-resolution displays., , , , , , , and . Comput. Graph., 25 (5): 811-818 (2001)Oblivious Hashing: A Stealthy Software Integrity Verification Primitive., , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 400-414. Springer, (2002)Reducing Waiting Costs in User-Level Communication., , and . IPPS, page 381-387. IEEE Computer Society, (1997)