Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Scheduling for Master-Worker Applications on the Computational Grid., , , and . GRID, volume 1971 of Lecture Notes in Computer Science, page 214-227. Springer, (2000)Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding., , , , , , , , , and 5 other author(s). IEEE Secur. Priv., 20 (6): 43-52 (2022)Preserving message integrity in dynamic process migration., , and . PDP, page 373-381. IEEE Computer Society, (1998)Evaluation of Strategies to Reduce the Impact of Machine Reclaim in Cycle-Stealing Environments., , , and . CCGRID, page 320-328. IEEE Computer Society, (2001)Analysis of Dynamic Heuristics for Workflow Scheduling on Grid Systems., , and . ISPDC, page 199-207. IEEE Computer Society, (2006)Trusted CI Experiences in Cybersecurity and Service to Open Science., , , , , , , , , and 9 other author(s). PEARC, page 60. ACM, (2019)Programming environment for a transputer based computer., , , , , and . Future Gener. Comput. Syst., 10 (2-3): 295-299 (1994)Efficient resource management applied to master worker applications., , , and . J. Parallel Distributed Comput., 64 (6): 767-773 (2004)Middleware to Manage Fault Tolerance Using Semi-Coordinated Checkpoints., , , and . IEEE Trans. Parallel Distributed Syst., 32 (2): 254-268 (2021)First principles vulnerability assessment., , , and . CCSW, page 87-92. ACM, (2010)