From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Java mobile code security by bytecode behavior analysis., , , и . IASTED Conf. on Software Engineering and Applications, стр. 90-95. IASTED/ACTA Press, (2004)Interprocess Communications in a Highly Diversified Distributed System.. IFIP Congress, стр. 149-154. (1977)Operating system conceptual model for ease of extension.. Operating Systems Engineering, том 143 из Lecture Notes in Computer Science, стр. 175-205. Springer, (1980)Adaptation and personalization of VLSI-based computer architecture., , и . MICRO, стр. 51-61. IEEE/ACM, (1981)Hierarchical Object Groups in Distributed Operating Systems., , и . ICDCS, стр. 18-24. IEEE Computer Society, (1988)Multimedia Information Processing Based on a General Media Model., , , , и . IFIP Congress, стр. 957-962. North-Holland/IFIP, (1986)Multimedia Machine., , , и . IFIP Congress, стр. 71-77. North-Holland/IFIP, (1983)Flexible User-Definable Memory Coherence Scheme in Distributed Shared Memory of GALAXY., , , и . EDMCC, том 487 из Lecture Notes in Computer Science, стр. 52-61. Springer, (1991)Parallel sort and join for high speed database machine operations.. AFIPS National Computer Conference, том 50 из AFIPS Conference Proceedings, стр. 515-520. AFIPS Press, (1981)Need-Based Requirements Change Management., и . ECBS, стр. 171-178. IEEE Computer Society, (2001)