From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Choice of Checkpoint Interval., , и . Applied Informatics, стр. 670-675. IASTED/ACTA Press, (2003)An On-Line Optimal Algorithm for Scheduling Soft Aperiodic Tasks in Hard Real-Time Systems., и . PDPTA, CSREA Press, (2000)Taking Point Decision Mechanism for Page-level Incremental Checkpointing based on Cost Analysis of Process Execution Time., , , и . J. Inf. Sci. Eng., 23 (5): 1325-1337 (2007)A fast mount mechanism for YAFFS2., , , , , , , и . SAC, стр. 1791-1795. ACM, (2012)Efficient Identification of Bad Signatures in RSA-Type Batch Signature., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 74-80 (2006)An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading., , и . IEICE Trans. Inf. Syst., 88-D (5): 1077-1081 (2005)Efficient parallel exponentiation in GF(2n) using normal basis representations., , , и . SPAA, стр. 179-188. ACM, (2001)EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor Networks., , , , и . International Conference on Computational Science (4), том 3994 из Lecture Notes in Computer Science, стр. 946-953. Springer, (2006)Linked Stack Buffer Management for Shared-Stacks., , , и . ICCSA (1), том 5072 из Lecture Notes in Computer Science, стр. 811-819. Springer, (2008)Kckpt: An efficient checkpoint and recovery facility on unixware kernel., , , и . CATA, стр. 303-308. ISCA, (2000)