Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countering Power Analysis Attacks UsingReliable and Aggressive Designs., and . IEEE Trans. Computers, 63 (6): 1408-1420 (2014)Low Overhead Multiprocessor Allocation Strategies Exploiting System Space Capacity for Fault Detection and Location., , and . IEEE Trans. Computers, 44 (7): 865-877 (1995)Correction: IEEE Transactions on Computers 44(9): 1167 (1995).The Generalized Folding-Cube., and . ICPP (1), page 372-375. Pennsylvania State University Press, (1990)Light-trail testbed for metro optical networks., , , , and . TRIDENTCOM, IEEE, (2006)CompuP2P: A light-weight architecture for internet computing., , and . BROADNETS, page 931-940. IEEE, (2005)All-Optical LAN Interconnection with a Wavelength Selective Router., and . INFOCOM, page 1278-1285. IEEE Computer Society, (1997)Necessary and sufficient condition for k crosstalk attacks localization in all-optical networks., and . GLOBECOM, page 2541-2546. IEEE, (2003)Fast recovery from database/link failures in mobile networks., , and . Comput. Commun., 23 (5-6): 561-574 (2000)Efficient overloading techniques for primary-backup scheduling in real-time systems., , and . J. Parallel Distributed Comput., 64 (5): 629-648 (2004)2D and 3D Optimal Parallel Image Warping., and . J. Parallel Distributed Comput., 25 (2): 197-208 (1995)