Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum source of entropy for black holes, , , and . Phys. Rev. D, 34 (2): 373--383 (July 1986)A Multithreaded Message-Passing System for High-Performance Distributed Computing Applications., , and . ICDCS, page 258-265. IEEE Computer Society, (1998)An Efficient Group Communication Architecture over ATM Networks., , and . Heterogeneous Computing Workshop, page 130-. IEEE Computer Society, (1998)Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency., , and . IAW, page 135-143. IEEE, (2003)An Extended IGMP Protocol for Mobile IPTV Services in Mobile WiMAX., , , and . MOBILWARE, volume 48 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 413-426. Springer, (2010)PMNet: Large-Scale Channel Prediction System for ICASSP 2023 First Pathloss Radio Map Prediction Challenge., , , and . ICASSP, page 1-2. IEEE, (2023)Simulation of FMCW and M-Sequence Ground Penetrating Radar Systems., , , , , and . RWS, page 142-145. IEEE, (2022)Active Event Correlation in Bro IDS to Detect Multi-stage Attacks., , and . IWIA, page 32-50. IEEE Computer Society, (2006)Virtual Cluster Computing Architecture., , and . PDPTA, page 290-293. CSREA Press, (2005)Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND)., , and . ACM Southeast Regional Conference, page 175-179. ACM, (2006)