Author of the publication

Specification technique for parallel processing: process-data representation.

, , , , , , and . AFIPS National Computer Conference, volume 50 of AFIPS Conference Proceedings, page 407-413. AFIPS Press, (1981)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Public Key Agreement Protocol., , and . Applied Informatics, page 654-657. IASTED/ACTA Press, (1999)A framework for multiple service discovery and robustness., , and . IASTED Conf. on Software Engineering and Applications, page 546-551. IASTED/ACTA Press, (2004)Principal Components of Port-Address Matrices in Port-Scan Analysis., , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 956-968. Springer, (2008)An Extended Centering Mechanism for Interpreting Pronouns and Zero-Pronouns., and . IEICE Trans. Inf. Syst., 78-D (1): 58-67 (1995)An efficient and generic reversible debugger using the virtual machine based approach., , and . VEE, page 79-88. ACM, (2005)SPiCE: A System for Translating Smalltalk Programs into a C Environment., and . ICCL, page 113-123. IEEE Computer Society, (1994)Conference Key Agreement Protocol Using Oblivious Transfer., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 347-353. Kluwer, (2000)Round-Trip Engineering of Web Applications Focusing on Dynamic Models., , and . ICEIS (3-2), page 228-233. (2008)978-989-8111-38-8.A comparative study on structure of the motivation for information security by security incident experiences., , , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 9-16. ACM, (2009)Augmented encrypted key exchange using RSA encryption., , and . PIMRC, page 490-494. IEEE, (1997)