Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Portable CPU-Management Framework for Java., and . IEEE Internet Comput., 8 (5): 74-83 (2004)Program transformations for light-weight CPU accounting and control in the Java virtual machine., and . High. Order Symb. Comput., 21 (1-2): 119-146 (2008)Portable Resource Control in Java: Application to Mobile Agent Security., , and . SEMAS, volume 63 of Electronic Notes in Theoretical Computer Science, page 1-16. Elsevier, (2001)Continuous Bytecode Instruction Counting for CPU Consumption Estimation., , and . QEST, page 19-30. IEEE Computer Society, (2006)Using Mobile Code for Semantic Interoperability in Distributed Agent Systems., and . GI Jahrestagung (2), volume 157 of Schriftenreihe der Österreichischen Computer-Gesellschaft, page 947-951. Konstanz UVK-Verl.-Ges., (2001)Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting., and . QAPL, volume 164 of Electronic Notes in Theoretical Computer Science, page 45-64. Elsevier, (2006)An Evolutive Distributed Algebraic Petri Nets Simulator.. ESM, page 348-352. SCS, The Society for Computer Simulation International, (1996)Using Comparative Behavior Analysis to Improve the Impact of Serious Games on Students' Learning Experience., , and . GALA, volume 10056 of Lecture Notes in Computer Science, page 199-210. Springer, (2016)Flexible and efficient measurement of dynamic bytecode metrics., and . GPCE, page 171-180. ACM, (2006)Using Interfaces to Specify Access Rights., , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 453-468. Springer, (1999)