Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Myrinet communication., , , , and . IEEE Micro, 18 (1): 50-52 (1998)Tangible security for mobile devices., and . MobiQuitous, ICST / ACM, (2008)UTLB: A Mechanism for Address Translation on Network Interfaces., , , , and . ASPLOS, page 193-204. ACM Press, (1998)The Alternating Direction Iterative of Axial Symmetric Electrostatic Field without Charge Current Distribution., , , , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 309-313. Springer, (2011)The Alternating Direction Iterative of Axial Symmetrical and Static Magnetic Field without Charge and Current Distribution., , , , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 405-410. Springer, (2011)Design Choices in the SHRIMP System: An Empirical Study., , , , , , , , , and 1 other author(s). ISCA, page 330-341. IEEE Computer Society, (1998)Automatic alignment of high-resolution multi-projector display using an un-calibrated camera., , , , and . IEEE Visualization, page 125-130. IEEE Computer Society and ACM, (2000)CLIP: A Checkpointing Tool for Message Passing Parallel Programs., , and . SC, page 33. ACM, (1997)Trading Capacity for Performance in a Disk Array., , , , , , and . OSDI, page 243-258. USENIX Association, (2000)Oblivious Hashing: A Stealthy Software Integrity Verification Primitive., , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 400-414. Springer, (2002)