Author of the publication

An urn model with applications to database performance evaluation.

, and . Computers & OR, 24 (4): 289-300 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAFE-OPS: An approach to embedded software security., , , , and . ACM Trans. Embedded Comput. Syst., 4 (1): 189-210 (2005)Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems., , , , and . CSE (2), page 830-836. IEEE Computer Society, (2009)Algorithms for budget-constrained survivable topology design., , and . ICC, page 2162-2166. IEEE, (2002)Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading., , , , and . HPCC, page 258-265. IEEE Computer Society, (2008)Performance Study of a Compiler/Hardware Approach to Embedded Systems Security., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 543-548. Springer, (2005)Addressing application integrity attacks using a reconfigurable architecture., , and . FPGA, page 250. ACM, (2004)Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards., , , and . IAS, page 125-130. IEEE, (2010)A Microeconomic Approach to Optimal File Allocation., and . ICDCS, page 28-35. IEEE Computer Society, (1986)Dynamic load balancing schemes for computing accessible surface area of protein molecules., , and . HiPC, page 326-333. IEEE Computer Society, (1998)SPEE: A Secure Program Execution Environment tool using code integrity checking., , and . J. High Speed Networks, 15 (1): 21-32 (2006)