Author of the publication

Chordet: an efficient and transparent replication for improving availability of peer-to-peer networked systems.

, , , , and . SAC, page 221-225. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Identification of Bad Signatures in RSA-Type Batch Signature., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 74-80 (2006)An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading., , and . IEICE Trans. Inf. Syst., 88-D (5): 1077-1081 (2005)On the Choice of Checkpoint Interval., , and . Applied Informatics, page 670-675. IASTED/ACTA Press, (2003)An On-Line Optimal Algorithm for Scheduling Soft Aperiodic Tasks in Hard Real-Time Systems., and . PDPTA, CSREA Press, (2000)A fast mount mechanism for YAFFS2., , , , , , , and . SAC, page 1791-1795. ACM, (2012)Efficient parallel exponentiation in GF(2n) using normal basis representations., , , and . SPAA, page 179-188. ACM, (2001)Taking Point Decision Mechanism for Page-level Incremental Checkpointing based on Cost Analysis of Process Execution Time., , , and . J. Inf. Sci. Eng., 23 (5): 1325-1337 (2007)EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor Networks., , , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 946-953. Springer, (2006)Linked Stack Buffer Management for Shared-Stacks., , , and . ICCSA (1), volume 5072 of Lecture Notes in Computer Science, page 811-819. Springer, (2008)Kckpt: An efficient checkpoint and recovery facility on unixware kernel., , , and . CATA, page 303-308. ISCA, (2000)