Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards seamless mobility on pervasive hardware., , , and . Pervasive Mob. Comput., 1 (2): 157-189 (2005)ETREE - A Database-Oriented Method for Generating Large Octree Meshes., , and . IMR, page 127-138. (2002)Decoupling Synchronization and Data Transfer in Message Passing Systems of Parallel Computers., , , , and . International Conference on Supercomputing, page 1-10. ACM, (1995)Interactive Resource-Intensive Applications Made Easy., , , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 143-163. Springer, (2007)Seurat: A Pointillist Approach to Anomaly Detection., , , , and . RAID, volume 3224 of Lecture Notes in Computer Science, page 238-257. Springer, (2004)Building blocks for a new generation of application specific computing systems., , , , , , , and . ASAP, page 190-201. IEEE, (1990)Topology discovery for large ethernet networks., , and . SIGCOMM, page 237-248. ACM, (2001)Direct Queries for Discovering Network Resource Properties in a Distributed Environment., , and . HPDC, page 38-46. IEEE Computer Society, (1999)Task Parallelism in a High Performance Fortran Framework., , and . IEEE Parallel Distributed Technol. Syst. Appl., 2 (3): 16-26 (1994)Counting network flows in real time., and . GLOBECOM, page 3888-3893. IEEE, (2003)