Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vintage Bit Cryptography., and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 261-265. Springer, (2006)Declarative coordination in a multicore environment: the tyranny of streams.. DAMP, page 65-66. ACM, (2011)Optical Interconnection hardware for scalable systems., , , , , , and . PDPTA, page 367-374. CSREA Press, (1996)Gearing Up: How to Eat Your Cryptocake and Still Have It., and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 258-259. Springer, (2011)Weakly-Constrained Codes for Suppression of Patterning Effects in Digital Communications., , and . IEEE Trans. Commun., 58 (10): 2845-2854 (2010)Use of F-Code as a Very High Level Intermediate Language for DSP., , and . Euro-Par, volume 1300 of Lecture Notes in Computer Science, page 820-823. Springer, (1997)Adaptive Electrical Signal Post-processing with Varying Representations in Optical Communication Systems., , , , , , , , and . EANN, volume 43 of Communications in Computer and Information Science, page 235-245. (2009)An Integrated Addressing and Routing System for Mobile Agents., , , and . PDPTA, page 2391-2397. CSREA Press, (1999)Communication-Centric Solution for Cholesky Decomposition: Industrial Case Study for Coordination Programming, , , , and . CoRR, (2013)Linear Support Vector Machines for Error Correction in Optical Data Transmission., , , , , and . ICANNGA, volume 7824 of Lecture Notes in Computer Science, page 438-445. Springer, (2013)