Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mosaic: Processing a Trillion-Edge Graph on a Single Machine., , , , , and . EuroSys, page 527-543. ACM, (2017)Hierarchical Directory-Based Shared Memory Architecture., , , and . Comput. J., 38 (3): 207-216 (1995)Semi-lock: An Efficient Cheat-Proof Synchronization Mechanism for Peer-to-Peer Game Systems., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 935-944. Springer, (2006)DReL: a middleware for wireless sensor networks management using reinforcement learning techniques., and . MidSens, page 1-7. ACM, (2010)ROMAN: Routing and opportunistic management of airborne networks., , , , , and . CTS, page 555-562. IEEE, (2011)A dynamic adaptive multiple access protocol for wireless integrated communications., , and . GLOBECOM, page 1302-1306. IEEE, (2001)AMTree: an active approach to multicasting in mobile networks., and . ICCCN, page 615-620. IEEE, (1999)Scaling Handwritten Student Assessments With a Document Image Workflow System., , , and . CVPR Workshops, page 2307-2314. Computer Vision Foundation / IEEE Computer Society, (2018)CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks., , and . MSWiM, page 69-78. ACM, (2012)A model for enhancing connection rerouting using active networks., , and . MSWiM, page 77-86. ACM, (1999)