Author of the publication

Protection in languages for real time programming.

, , and . ECI, volume 65 of Lecture Notes in Computer Science, page 237-248. Springer, (1978)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Streams Sharing a Finite Buffer: Protection Problems., and . Inf. Process. Lett., 12 (3): 151-159 (1981)Adaptive routing for dynamic applications in massively parallel architectures., , , and . IEEE Parallel Distributed Technol. Syst. Appl., 3 (1): 61-74 (1995)Multiple Access to a Tree in the Context of Readers and Writers Problem., and . Inf. Process. Lett., 7 (2): 112-121 (1978)Erratum: Information Processing Letters 7(4): 207 (1978).Performance Evaluation of a Process Control System by Simulation Model., , and . Comput. J., 17 (4): 365-370 (1974)Language Features for Access Control., , and . IEEE Trans. Software Eng., 9 (1): 16-25 (1983)Linguistic Mechanisms for Resource Management Strategies., , , and . Softw. Pract. Exp., 11 (3): 291-314 (1981)Protection in languages for real time programming., , and . ECI, volume 65 of Lecture Notes in Computer Science, page 237-248. Springer, (1978)A Routing Strategy for Object-Oriented Applications in Massively Parallel Architectures., , , and . Parallel Process. Lett., 7 (3): 237-247 (1997)Multiple-Microprocessor Programming Techniques: MML, a New Set of Tools., , , , and . Computer, 17 (1): 47-59 (1984)Some Properties of Deadlock Detection and Recovery in Readers and Writers Problems., and . Inf. Process. Lett., 5 (4): 118-123 (1976)