Author of the publication

Study and Design of Scalable Memory-Shared Multiprocessing System.

, , and . APDC, page 220-227. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecDM: Securing Data Migration between Cloud Storage Systems., , , , , and . DASC, page 636-641. IEEE Computer Society, (2011)Study and Design of Scalable Memory-Shared Multiprocessing System., , and . APDC, page 220-227. IEEE Computer Society, (1997)DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service., , , , and . ICISSP, page 146-156. SciTePress, (2016)Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine., , , , and . ICISSP, page 380-387. SciTePress, (2016)Attribute-Based Encryption Without Key Escrow., , , , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 74-87. Springer, (2015)S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm., , , , , and . HPCC/SmartCity/DSS, page 623-630. IEEE Computer Society, (2016)CUT: A Combined Approach for Tag Recommendation in Software Information Sites., , , , and . KSEM, volume 9983 of Lecture Notes in Computer Science, page 599-612. (2016)HL-EncDec: A Hybrid-Level Encoder-Decoder for Neural Response Generation., , , , and . COLING, page 845-856. Association for Computational Linguistics, (2018)A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud., , , , and . TrustCom/BigDataSE/ICESS, page 347-354. IEEE Computer Society, (2017)Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming., , , , and . ISCC, page 783-786. IEEE, (2018)