Author of the publication

Evaluation of a virtual shared memory machine by the compilation of data parallel loops.

, , , and . PDP, page 309-316. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative selection of countermeasures for intelligent threat agents., , and . Int. Journal of Network Management, 25 (5): 340-354 (2015)Assessing and managing the information and communication risk of power generation., , , , and . Computers & Electrical Engineering, (2015)A Scenario Method to Automatically Assess ICT Risk., , , and . PDP, page 544-551. IEEE Computer Society, (2014)Building Trustworthy Intrusion Detection through VM Introspection., and . IAS, page 209-214. IEEE Computer Society, (2007)Modeling and Managing Risk in Billing Infrastructures., , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 51-64. Springer, (2009)DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks., , and . IEEE Trans. Dependable Sec. Comput., 12 (2): 164-178 (2015)Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain., , and . PVM/MPI, volume 2131 of Lecture Notes in Computer Science, page 304-311. Springer, (2001)Q-Learning in Evolutionary Rule Based Systems., , and . PPSN, volume 866 of Lecture Notes in Computer Science, page 270-279. Springer, (1994)A tool for the static optimization of concurrent programs., and . COMPSAC, page 10-17. IEEE, (1991)Pisa parallel processing project on general-purpose highly-parallel computers., , , , , , , , and . COMPSAC, page 536-543. IEEE, (1991)