Author of the publication

Time Lower Bounds for Permutation Routing on Multi-Dimensional Bused Meshes.

, and . Parallel Processing Letters, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Current and Future Process Control Systems., , , , , , , , , and 2 other author(s). Critical Infrastructure Protection, volume 253 of IFIP, page 99-115. Springer, (2007)Detecting Disruptive Routers: A Distributed Network Monitoring Approach., , , , and . IEEE Symposium on Security and Privacy, page 115-124. IEEE Computer Society, (1998)A Functional Perspective on Machine Learning via Programmable Induction and Abduction., , , , and . FLOPS, volume 10818 of Lecture Notes in Computer Science, page 84-98. Springer, (2018)Avoiding Pitfalls of Entity Identifiers.. High-Performance Web Databases, page 277-303. Auerbach, (2001)Dependable Intrusion Tolerance: Technology Demo., , , , , , , , and . DISCEX (2), page 128-130. IEEE Computer Society, (2003)Routing with Locality on Meshes with Buses., and . J. Parallel Distrib. Comput., 33 (1): 84-90 (1996)Malware Characterization through Alert Pattern Discovery., and . LEET, USENIX Association, (2009)Routing with locality in partitioned-bus meshes., and . SPDP, page 715-721. IEEE Computer Society, (1994)Intrusion Monitoring in Process Control Systems., and . HICSS, page 1-7. IEEE Computer Society, (2009)Abductive functional programming, a semantic approach., , and . CoRR, (2017)