Author of the publication

Trusting Groups in Coalition Formation Using Social Distance.

, , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 418-428. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of an Array and Vector Processing Language., , , and . ICPP, page 232-239. IEEE Computer Society, (1983)Heterogeneity-Aware Distributed Access Structure., , and . Peer-to-Peer Computing, page 152-153. IEEE Computer Society, (2005)Process to processor mapping within the mathematician's Devil., , , and . Microprocessing and Microprogramming, 39 (2-5): 129-132 (1993)Software Environments.. PDP, page 538-539. IEEE Computer Society, (1995)An FPGA implementation of Walsh-Hadamard transforms for signal processing., , , and . ICASSP, page 1105-1108. IEEE, (2001)An Iterative Approach to Trustable Systems Management Automation and Fault Handling., , , and . J. Network Syst. Manage., 22 (3): 366-395 (2014)An FPGA based Walsh Hadamard transforms., , and . ISCAS (2), page 569-572. IEEE, (2001)A Neural Network Based Tool for Semi-automatic Code Transformation., , and . VECPAR, volume 1981 of Lecture Notes in Computer Science, page 142-153. Springer, (2000)A Meta-heuristic Approach to Parallel Code Generation., , and . VECPAR, volume 2565 of Lecture Notes in Computer Science, page 693-702. Springer, (2002)Custom Coprocessor Based Matrix Algorithms for Image and Signal Processing., , , and . FPL, volume 2438 of Lecture Notes in Computer Science, page 730-739. Springer, (2002)