Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Mostly-Copying and Mark-Sweep Conservative Collection., and . ISMM, page 68-78. ACM, (1998)Certified Run-Time Code Generation.. Cornell University, USA, (2002)Alias Types., , and . ESOP, volume 1782 of Lecture Notes in Computer Science, page 366-381. Springer, (2000)Kleene Algebra with Tests: Completeness and Decidability., and . CSL, volume 1258 of Lecture Notes in Computer Science, page 244-259. Springer, (1996)Hancock: a language for processing very large-scale data., , , and . DSL, page 163-176. ACM, (1999)The Performance of Preconditioned Iterative Methods in Computational Electromagnetics. University of Illinois Urbana-Champaign, USA, (1987)Introduction, and . Modern and Global Ayurveda: Pluralism and Paradigms, chapter 1, SUNY Press, New York, (2008)Decrepitation characteristics of igneous rocks. Can Mineral, 6 (1): 78-86 (1957)The Self Possessed: Deity and Spirit Possession in South Asian Literature and Civilization. Columbia University Press, New York, (2006)Phishing With A Darknet: Imitation of Onion Services., and . eCrime, page 1-13. IEEE, (2020)