Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-the-fly Deadlock Prevention., and . PODC, page 165-172. ACM, (1982)Service Brokering and Mediation: Enabling Next Generation Market and Customer Driven Service Delivery., , , and . ISADS, page 525-530. IEEE Computer Society, (2011)PECAN: Policy-Enabled Configuration Across Networks., , , , , , , , , and 1 other author(s). POLICY, page 52-62. IEEE Computer Society, (2003)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , and . POLICY, page 102-105. IEEE Computer Society, (2009)Policy-Based Mobile Ad Hoc Network Management., , , , , , and . POLICY, page 35-44. IEEE Computer Society, (2004)A Proof Technique for Communicating Sequential Processes., and . Acta Inf., (1981)Evaluation of the Surveillance, Epidemiology, and End Results Data Management System (SEER*DMS) to support the efforts in enhancing U.S cancer surveillance., , , , , and . AMIA, AMIA, (2017)Computing Fibonacci Numbers (and Similarly Defined Functions) in Log Time., and . Inf. Process. Lett., 11 (2): 68-69 (1980)Assignment and Procedure Call Proof Rules., and . ACM Trans. Program. Lang. Syst., 2 (4): 564-579 (1980)On Automated Policy Generation for Mobile Ad Hoc Networks., , , , , , , and . POLICY, page 256-260. IEEE Computer Society, (2007)