Author of the publication

Exploiting the locality of data structures in multithreaded architecture.

, , , , , and . ICPADS, page 352-358. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delayed ” Choice” Quantum Eraser, , , , and . Physical Review Letters, 84 (1): 1--5 (Jan 3, 2000)Data Mining Techniques to Facilitate Digital Forensics Investigations., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 376-379. Springer, (2016)Performance Improvement of Block Error Probabilities of FS MC-CDMA System Using BCH Coding Scheme in Slow Multi-path Fading Channels., , and . IPC, page 360-363. IEEE Computer Society, (2007)Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks., , , , and . FGCN (1), page 342-349. IEEE Computer Society, (2007)Chord-Based Musical Composition and Incorporating it into Auto-Accompaniment Instrument., , , and . FGCN (2), page 429-432. IEEE Computer Society, (2007)Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 567-572. Springer, (2005)Heat Transfer and Pressure Drop Characteristics in Straight Microchannel of Printed Circuit Heat Exchangers., , , , and . Entropy, 17 (5): 3438-3457 (2015)e-Gov Net Based Emergency Management Service., and . FGCN (2), page 237-240. IEEE Computer Society, (2008)978-0-7695-3431-2.Intelligent and Effective Digital Watermarking Scheme for Mobile Content Service., , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 492-497. Springer, (2005)Adaptive Selection of Coefficient's Portions in the Transform Domain Watermarking., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 560-566. Springer, (2005)