Author of the publication

JAPS-II: A Source to Source Parallelizing Compiler for Java.

, , , , and . PDPTA, page 164-170. CSREA Press, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zang, Wanyu
add a person with the name Zang, Wanyu
 

Other publications of authors with the same name

JAPS-II: A Source to Source Parallelizing Compiler for Java., , , , and . PDPTA, page 164-170. CSREA Press, (2002)Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures., , , and . SECRYPT, page 478-485. SciTePress, (2010)Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks., , , and . ICC, page 1-6. IEEE, (2011)Quantitative survivability evaluation of three virtual machine-based server architectures., , , , , , and . J. Network and Computer Applications, 36 (2): 781-790 (2013)A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 289-302. Springer, (2006)Risk balance defense approach against intrusions for network server., , , and . Int. J. Inf. Sec., 13 (3): 255-269 (2014)Intrusion Masking for Distributed Atomic Operations., , and . SEC, volume 250 of IFIP Conference Proceedings, page 229-240. Kluwer, (2003)The implementation and evaluation of a recovery system for workflows., , and . J. Network and Computer Applications, 32 (1): 158-183 (2009)Incentive-based modeling and inference of attacker intent, objectives, and strategies., , and . ACM Trans. Inf. Syst. Secur., 8 (1): 78-118 (2005)Approximate Self-Adaptive Data Collection in Wireless Sensor Networks., , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)