From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks., , , и . S&P, стр. 259-271. IEEE Computer Society, (2004)Processor Scheduling on Multiprogrammed, Distributed Memory Parallel Computers., , и . SIGMETRICS, стр. 158-170. ACM, (1993)DyRecT: Software Support for Adaptive Parallelism on NOWs., , и . IPDPS Workshops, том 1800 из Lecture Notes in Computer Science, стр. 1168-1175. Springer, (2000)GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks., , , и . MobiQuitous, стр. 42-51. IEEE Computer Society, (2004)Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers.. ICPP, стр. 489-492. IEEE Computer Society, (1997)A Parallel Solution to the Cutting Stock Problem for a Cluster of Workstations., , , и . HPDC, стр. 521-530. IEEE Computer Society, (1996)Processor Allocation in Multiprogrammed Distributed-Memory Parallel Computer Systems., , и . J. Parallel Distributed Comput., 46 (1): 28-47 (1997)Design and implementation of a parallel solution to the cutting stock problem., , , и . Concurr. Pract. Exp., 10 (10): 783-805 (1998)LEAP: efficient security mechanisms for large-scale distributed sensor networks., , и . ACM Conference on Computer and Communications Security, стр. 62-72. ACM, (2003)Supporting Dynamic Reconfiguration of Parallel Applications on Clusters of Non-dedicated Workstations., , , и . PPSC, SIAM, (1997)