Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Performance Evaluation Model for Distributed Software with Reliability Constrains., , , , , and . The Journal of Supercomputing, 34 (2): 165-179 (2005)A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections., , , and . IJISP, 4 (1): 18-31 (2010)Metric planar rectification from perspective view via circles., , , and . CIIP, page 69-75. IEEE, (2009)Signature Buffer: Bridging Performance Gap between Registers and Caches., , and . HPCA, page 164-175. IEEE Computer Society, (2004)Efficiency and safety of sponge bathing in combination with different Chinese herbal preparations in patients with hyperthermia., , , , and . BIBM, page 86-90. IEEE Computer Society, (2014)Web based E-government information sharing system., , , and . IRI, page 63-68. IEEE Systems, Man, and Cybernetics Society, (2006)Sum-Rate Analysis of MIMO Broadcast Channel with Random Unitary Beamforming., , and . WCNC, page 533-537. IEEE, (2008)Two-level soft error vulnerability prediction on SMT/CMP architectures., , and . IISWC, page 78. IEEE Computer Society, (2011)Coterminous locality and coterminous group data prefetching on chip-multiprocessors., , , , , , and . IPDPS, IEEE, (2006)BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform., , , , , , and . ICDE, page 582-593. IEEE Computer Society, (2012)