Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models of Parallel Applications with Large Computation and I/O Requirements., , , and . IEEE Trans. Software Eng., 28 (3): 286-307 (2002)Disarming offense to facilitate defense., and . NSPW, page 69-75. ACM, (2000)S-ARP: a Secure Address Resolution Protocol., , and . ACSAC, page 66-74. IEEE Computer Society, (2003)Adding Availability to Log Services of Untrusted Machines., , and . ACSAC, page 199-206. IEEE Computer Society, (1999)Workload Characterization For Performance Engineering Of Parallel Applications., and . PDP, page 457-462. IEEE, (1994)L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT, , and . Crimine virtuale, minaccia reale. ICT Security: politiche e strumenti di prevenzione, volume 571.2.7 of FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)Scheduling issues in high-performance computing., , , and . SIGMETRICS Perform. Evaluation Rev., 26 (4): 60-69 (1999)A methodology for the evaluation of multiprocessor non-preemptive allocation policies., , , and . J. Syst. Archit., 44 (9-10): 703-721 (1998)A quantitative study of Public Key Infrastructures., , and . Comput. Secur., 22 (1): 56-67 (2003)Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues., and . Mob. Networks Appl., 7 (6): 503-511 (2002)