Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Text Recognition System Based on a Neural Network and on a Deformed System., , and . IWANN, volume 930 of Lecture Notes in Computer Science, page 913-918. Springer, (1995)Liveness Conditions for a Safe Distributed Deadlock Resolution Algorithm., , , and . PDP, page 139-146. IEEE Computer Society, (1996)Correctness of a distributed deadlock resolution algorithm for the single request model., , , and . PDP, page 254-261. IEEE Computer Society, (1995)A Performance Evaluation of a Safe-distributed Deadlock Resolution Algorithm for the OR Model., , , , and . IASTED PDCS, page 210-216. IASTED/ACTA Press, (2002)Relaxed Approaches for Correct DB-Replication with SI Replicas., , , , , and . ICSOFT (Selected Papers), volume 47 of Communications in Computer and Information Science, page 161-174. Springer, (2008)Design of a MidO2PL Database Replication Protocol in the MADIS Middleware Architecture., , , and . AINA (2), page 861-865. IEEE Computer Society, (2006)Fuzzy location and tracking on wireless networks., , , , and . MOBIWAC, page 84-91. ACM, (2006)Deformed systems for contextual postprocessing., , , and . Fuzzy Sets Syst., 96 (3): 335-341 (1998)An Imperfect String Matching Experience Using Deformed Fuzzy Automata., , , , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 115-123. IOS Press, (2002)A Deterministic Database Replication Protocol Where Multicast Writesets Never Get Aborted., , , , and . OTM Workshops (1), volume 4805 of Lecture Notes in Computer Science, page 1-2. Springer, (2007)