Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing., , , and . Ann. UMCS Informatica, 2 (1): 414-424 (2004)Performance analysis of parallel high-resolution image restoration algorithms on Intel supercomputer., , , and . Concurr. Comput. Pract. Exp., (2021)Utilization of Modified CoreGRID Ontology in an Agent-based Grid Resource Management System., , , , , , and . CATA, page 240-245. ISCA, (2010)Introduction., , and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Parallel Quasi-Monte Carlo Computation of Invariant Measures., , , and . PPSC, (2001)Applying SIMD Approach to Whole Genome Comparison on Commodity Hardware., , , and . PPAM, volume 4967 of Lecture Notes in Computer Science, page 1220-1229. Springer, (2007)Porting CFD Codes Towards Grids: A Case Study., , and . PPAM, volume 3911 of Lecture Notes in Computer Science, page 817-824. Springer, (2005)Implementing an eXAT-based distributed monitoring system prototype., , , and . Comput. Sci. Inf. Syst., 9 (3): 1249-1285 (2012)Trade-off between Complexity of Structured Tagging and Effectiveness of Web Service Retrieval., , , and . ICWE Workshops, volume 6385 of Lecture Notes in Computer Science, page 289-300. Springer, (2010)Network protocol textbook is an asset Book Review.. IEEE Concurrency, 8 (2): 87 (2000)