From post

Improving the Data Placement Algorithm of Randomization in SAN.

, , и . International Conference on Computational Science (3), том 3516 из Lecture Notes in Computer Science, стр. 415-422. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks., , , и . EURASIP J. Wireless Comm. and Networking, (2013)Study on the Data Flow Balance in NFS Server with iSCSI., , , и . ICA3PP (1), том 7439 из Lecture Notes in Computer Science, стр. 253-272. Springer, (2012)A collusion-resistant dynamic key management scheme for WSNs., и . Secur. Commun. Networks, 9 (18): 6351-6364 (2016)Improving the Data Placement Algorithm of Randomization in SAN., , и . International Conference on Computational Science (3), том 3516 из Lecture Notes in Computer Science, стр. 415-422. Springer, (2005)An Evolutionary Generation Method of Test Data for Multiple Paths Based on Coverage Balance., , , , и . IEEE Access, (2021)Generating word and document matrix representations for document classification., и . Neural Comput. Appl., 32 (14): 10087-10108 (2020)IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks., , , , , и . Int. J. Ad Hoc Ubiquitous Comput., 32 (2): 133-145 (2019)Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining., , , , и . Wirel. Pers. Commun., 85 (3): 1205-1215 (2015)A New Method to Protect Software from Cracking., , и . CSIE (2), стр. 636-638. IEEE Computer Society, (2009)Memory Confidentiality and Integrity Protection Technology., , , и . CSPS (3), том 517 из Lecture Notes in Electrical Engineering, стр. 1073-1080. Springer, (2018)