Author of the publication

An Efficient Distributed Mutual Exclusion Algorithm.

, , , , and . ICPP, Vol. 1, page 196-203. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , and . WCNC, page 3341-3346. IEEE, (2007)Belief based data cleaning for wireless sensor networks., , and . Wireless Communications and Mobile Computing, 12 (5): 406-419 (2012)A Unified Model and Methodology for Temporal Object Databases., and . Int. J. Cooperative Inf. Syst., 2 (2): 201-224 (1993)A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems., , and . Int. Journal in Computer Simulation, 4 (1): 65-88 (1994)An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks., , , and . ICCCN, page 865-873. IEEE Computer Society, (1998)Game theoretic modeling of security and trust relationship in cyberspace., , and . Int. J. Communication Systems, 29 (9): 1500-1512 (2016)Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems., , , and . PDPTA, page 1229-1238. CSREA Press, (1997)An Efficient Solution To The Critical Section Problem In Distributed Systems., , and . ICPP (2), page 77-80. CRC Press, (1994)An Efficient Distributed Mutual Exclusion Algorithm., , , , and . ICPP, Vol. 1, page 196-203. IEEE Computer Society, (1996)Providing Performance Guarantees for Buffered Crossbar Switches without Speedup., , , and . QSHINE, volume 22 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 297-314. Springer, (2009)