From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Password-Based Authentication: Preventing Dictionary Attacks, и . IEEE Computer, 40 (6): 68 -- 74 (июня 2007)Carpooling in Mobile Ad Hoc Networks: the Case of Multiple-Target Route Discovery., и . WiOpt, стр. 1-9. IEEE, (2007)Analysis of the Probability of Transaction Abort and Throughput of Two Timestamp Ordering Algorithms for Database Systems.. IEEE Trans. Knowl. Data Eng., 3 (2): 261-266 (1991)An Improved O(log N) Mutual Exclusion Algorithm for Distributed Systems., , и . ICPP (3), стр. 295-302. Pennsylvania State University Press, (1990)0-271-00728-1.Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks., и . MSWiM, стр. 53-62. ACM, (2005)Universal Constructs in Distributed Computations., и . Euro-Par, том 1685 из Lecture Notes in Computer Science, стр. 795-805. Springer, (1999)Route Optimization in Mobile ATM Networks., , и . MobiCom, стр. 43-54. ACM, (1997)Towards Energy-Fairness in LoRa Networks., , , , и . ICDCS, стр. 788-798. IEEE, (2019)Guest Editors' Note., и . Pervasive Mob. Comput., 2 (2): 109-110 (2006)Checkpointing with mutable checkpoints., и . Theor. Comput. Sci., 290 (2): 1127-1148 (2003)