Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High throughput computing over peer-to-peer networks., , and . Future Generation Comp. Syst., 29 (1): 352-360 (2013)Modeling the availability of Cassandra., , and . J. Parallel Distrib. Comput., (2015)Competition-based failure-aware scheduling for High-Throughput Computing systems on peer-to-peer networks., , and . Cluster Computing, 18 (3): 1229-1249 (2015)Evaluating the cell broadband engine as a platform to run estimation of distribution algorithms., , and . GECCO (Companion), page 2491-2498. ACM, (2009)Porting Estimation of Distribution Algorithms to the Cell Broadband Engine., , and . Parallel Computing, 36 (10-11): 618-634 (2010)Probabilistic Evaluation of the Exploration-Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks., , , , , and . Inf., 12 (12): 509 (2021)Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation., , , , and . Theor. Comput. Sci., (2022)Improved Objective Functions to Search for 8 × 8 Bijective S-Boxes With Theoretical Resistance Against Power Attacks Under Hamming Leakage Models., , , , and . IEEE Access, (2022)