From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the vulnerability of superpeer networks against attack., , , и . ACM Conference on Computer and Communications Security, стр. 225-234. ACM, (2007)Multiple Stack Branch and Bound., , , и . Inf. Process. Lett., 37 (1): 43-48 (1991)A Low-Overhead Partition-Oriented ERfair Scheduler for Hard Real-Time Embedded Systems., , , и . IEEE Embed. Syst. Lett., 3 (1): 5-8 (2011)Effect of Dynamicity on Peer to Peer Networks., , и . HiPC, том 4873 из Lecture Notes in Computer Science, стр. 452-463. Springer, (2007)Reducing Reexpansions in Iterative-Deepening Search by Controlling Cutoff Bounds., , , и . Artif. Intell., 50 (2): 207-221 (1991)Improving Greedy Algorithms by Lookahead-Search., , , и . J. Algorithms, 16 (1): 1-23 (1994)A New algorithm for combined PLA folding., , и . VLSI Design, стр. 368-369. IEEE Computer Society, (1992)Measuring robustness of superpeer topologies., , , и . PODC, стр. 372-373. ACM, (2007)A stochastic model of e-customer behavior., , и . Electron. Commer. Res. Appl., 2 (1): 81-94 (2003)Design benchmarking, user behavior analysis and link-structure personalization in commercial web sites., , и . Internet Res., 16 (3): 248-266 (2006)