Author of the publication

Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks.

, , , , and . PDPTA, page 2300-2306. CSREA Press, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast detection of high-order epistatic interactions in genome-wide association studies using information theoretic measure., , , , and . Comput. Biol. Chem., (2014)Optimal Transmission Scheduling for All-to-All Broadcast in WDM Optical Passive Star Networks., , , , and . PDPTA, page 2300-2306. CSREA Press, (1999)Extensions and Variations on Construction of Autoreplicators in Typogenetics., and . ECAL, volume 3630 of Lecture Notes in Computer Science, page 685-694. Springer, (2005)Detection of Loadable Kernel Module Rootkit., and . Security and Management, page 385-389. CSREA Press, (2003)A comment on two-locus epistatic interaction models for genome-wide association studies., and . J. Bioinform. Comput. Biol., 13 (6): 1571004:1-1571004:15 (2015)Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences., and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 206-216. Springer, (2003)Construction of Finite Automata for Intrusion Detection from System Call Sequences by Genetic Algorithms., and . PAKDD, volume 3918 of Lecture Notes in Computer Science, page 594-602. Springer, (2006)Optimal Scheduling Algorithms in WDM Optical Passive Star Networks., , and . IPPS/SPDP Workshops, volume 1586 of Lecture Notes in Computer Science, page 887-896. Springer, (1999)Investigating the utility of clinical outcome-guided mutual information network in network-based Cox regression., , , and . BMC Syst. Biol., 9 (S-1): S8 (2015)Limits of Signature-Based Detection of Buffer Overflow Attacks., and . Security and Management, page 288-293. CSREA Press, (2003)