Author of the publication

Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling.

, , and . Parallel and Distributed Computing and Networks, page 134-140. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Client Honeypot Multiplication with High Performance and Precise Detection., , , , and . IEICE Trans. Inf. Syst., 98-D (4): 775-787 (2015)Proactive AP Selection Method Considering the Radio Interference Environment., , , , and . IEICE Trans. Inf. Syst., 92-D (10): 1867-1876 (2009)Performance comparison of layer 3 switches in cases of flow- and topology-driven connection setup., , , and . J. Commun. Networks, 2 (2): 118-126 (2000)A framework of a content distribution service synchronized with tv broadcasting programs., , , and . CCNC, page 1063-1067. IEEE, (2006)A Fast Polling I/O Implementation with Real-time Signals., , and . NCA, page 317-322. IEEE Computer Society, (2004)New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility.. SAINT, page 352. IEEE Computer Society, (2011)A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average., , and . SAINT, page 278-283. IEEE Computer Society, (2012)Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast., , and . AINA Workshops, page 1307-1312. IEEE Computer Society, (2013)Wireless Measurement Framework to Survey an Area with Required Communication Quality., , , and . AINA Workshops, page 439-446. IEEE Computer Society, (2009)Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing., , , , and . CLOSER, page 145-148. SciTePress, (2013)