Author of the publication

An Efficient Strategy for Supporting Fully Interactive Display in a Video-on-Demand Server.

, , , , and . IW-MMDBMS, page 28-35. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table., and . VLDB, page 245-254. Morgan Kaufmann, (1984)Business Agent., , , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 449-457. Springer, (2002)Similarity Retrieval of Iconic Images Based on 2D String Longest Common Subsequence., , and . DASFAA, page 337-341. Dept. of Computer Science, KAIST, P.O. Box 150, ChongRyang, Seoul, 131-650, Korea, (1989)Broadcasting on Incomplete Hypercubes., , and . IEEE Trans. Computers, 42 (11): 1393-1398 (1993)Reaching Fault Diagnosis Agreement under a Hybrid Fault Model., , and . IEEE Trans. Computers, 49 (9): 980-986 (2000)Concurrent operations in linear hashing., , and . Inf. Sci., 51 (2): 193-211 (1990)Generalizing the Division Operation on Indefinite Databases., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 347-354. World Scientific, Singapore, (1992)2d random filter and analysis., and . Int. J. Comput. Math., 42 (1-2): 33-45 (1992)Dynamic Multiprocessor Scheduling for Supporting Real-Time Constraints., , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 83-97. Springer, (1997)An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme., , and . Appl. Math. Comput., 163 (1): 169-178 (2005)