Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation of PRAMs with Scan Primitives by Unbounded Fan-In Circuits.. Inf. Process. Lett., 68 (6): 275-282 (1998)Multidimensional Declustering Schemes Using Golden Ratio and Kronecker Sequences., , and . IEEE Trans. Knowl. Data Eng., 15 (3): 659-670 (2003)Biased Skip Lists for Highly Skewed Access Patterns., , , and . ALENEX, volume 2153 of Lecture Notes in Computer Science, page 216-230. Springer, (2001)Integrated system interoperability testing with applications to VoIP., , , and . IEEE/ACM Trans. Netw., 12 (5): 823-836 (2004)Efficient Oblivious Branching Programs for Threshold and Mod Functions., and . J. Comput. Syst. Sci., 55 (3): 373-384 (1997)A Hierarchical Technique for Constructing Efficient Declustering Schemes for Range Queries., , and . Comput. J., 46 (4): 358-377 (2003)Bounds on Sample Space Size for Matrix Product Verification., and . Inf. Process. Lett., 48 (2): 87-91 (1993)Cross-layer techniques for failure restoration of IP multicast with applications to IPTV., , , , , , and . COMSNETS, page 1-10. IEEE, (2010)Proactive Network Management of IPTV Networks., , , , , , , and . INM/WREN, USENIX Association, (2010)Link selection schemes for avoiding channel contention., , , , and . DRCN, page 288-295. IEEE, (2003)