Author of the publication

Optimal Data Parallel Methods for Stochastic Dynamical Programming.

, , and . ICPP (3), page 142-146. CRC Press, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multivariate data analysis software for enhancing system security., , and . Journal of Systems and Software, 31 (3): 267-275 (1995)A robust certification service for highly dynamic MANET in emergency tasks., , , , , and . Int. J. Communication Systems, 22 (9): 1177-1197 (2009)Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems., , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 414-426. Springer, (2004)Real-Time Emulation of Intrusion Victim in HoneyFarm., , , , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 143-154. Springer, (2004)Anomaly Detection in Grid Computing Based on Vector Quantization., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 883-886. Springer, (2004)Efficient vector quantization using genetic algorithm., , , , , and . Neural Computing and Applications, 14 (3): 203-211 (2005)Efficient Fingercode Classification., , , , , and . IEICE Transactions, 91-D (5): 1252-1260 (2008)Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services., , , , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 63-75. Springer, (2003)Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network., , , and . EUC (2), page 312-317. IEEE Computer Society, (2008)978-0-7695-3492-3.An Economic Model to Estimate Software Rewriting and Replacement Times., , and . IEEE Trans. Software Eng., 22 (8): 580-598 (1996)