Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes., , , and . IEEE Trans. Dependable Sec. Comput., 4 (1): 41-55 (2007)Collaborative detection and filtering of shrew DDoS attacks using spectral analysis., and . J. Parallel Distrib. Comput., 66 (9): 1137-1151 (2006)Simulated Performance of a RISC-based Multiprocessor Using Orthogonal-Access Memory., and . J. Parallel Distrib. Comput., 13 (1): 43-57 (1991)Polynomial Division on Systolic Arrays., and . IEEE Trans. Computers, 34 (6): 577-578 (1985)Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks., , , and . IEEE Trans. Parallel Distrib. Syst., 22 (8): 1342-1349 (2011)Adaptive Workload Prediction of Grid Performance in Confidence Windows., , , and . IEEE Trans. Parallel Distrib. Syst., 21 (7): 925-938 (2010)Fast Data Manipulation in Multiprocessors Using Parallel Pipelined Memories., and . J. Parallel Distrib. Comput., 12 (2): 130-145 (1991)Cyclic Decomposition of Finite Stochastic Systems.. J. Comput. Syst. Sci., 9 (1): 56-68 (1974)Stripped mirroring RAID architecture., and . Journal of Systems Architecture, 46 (6): 543-550 (2000)Distributed Hardwired Barrier Synchronization for Scalable Multiprocessor Clusters., and . IEEE Trans. Parallel Distrib. Syst., 6 (6): 591-605 (1995)