Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Security Classification with Lasso., , , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 399-410. Springer, (2015)A Routing Methodology for Achieving Fault Tolerance in Direct Networks., , , , , , , and . IEEE Trans. Computers, 55 (4): 400-415 (2006)An Efficient Fault-Tolerant Routing Methodology for Meshes and Tori., , , , , , , and . IEEE Comput. Archit. Lett., (2004)A New Adaptive Fault-Tolerant Routing Methodology for Direct Networks., , , , , , , and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 462-473. Springer, (2004)Methods for service discovery in Bluetooth scatternets., , and . Computer Communications, 27 (11): 1087-1096 (2004)Scalable Interconnection Networks., , , , and . Simula Research Laboratory, Springer, (2010)A Routing Methodology for Dynamic Fault Tolerance in Meshes and Tori., and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 514-527. Springer, (2007)Data Loss Prevention Based on Text Classification in Controlled Environments., , , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 131-150. Springer, (2016)An Effective Fault-Tolerant Routing Methodology for Direct Networks., , , , , , , and . ICPP, page 222-231. IEEE Computer Society, (2004)XML and Web Services Security Standards.. IEEE Communications Surveys and Tutorials, 11 (3): 4-21 (2009)