Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of an Extensible Network Testbed., , , , and . NCA, page 117-124. IEEE Computer Society, (2010)Refinement of Safety-Related Hazards into Verifiable Code Assertions., and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 345-358. Springer, (1998)Root cause analysis and diagnosis in SOA and cloud environments., , , and . CASCON, page 335-336. ACM, (2009)Computer crime - Risk management and computer security.. Comput. Secur., 4 (4): 287-295 (1985)Improving Predictable Shared-Disk Clusters Performance for Database Clouds., , , , , , , and . ICDE, page 237-242. IEEE Computer Society, (2017)Decoy Systems with Low Energy Bluetooth Communication., and . ICISSP, page 404-409. SciTePress, (2018)Incorporating Process Induced Effects into RC Extraction., , , , and . VLSI Design, page 12-17. IEEE Computer Society, (1999)Experimental evaluation of a coarse-grained switch scheduler., , , and . ANCS, page 37-38. ACM, (2007)Performance Analysis of a Parallel Logic Simulation Machine., and . J. Parallel Distributed Comput., 7 (3): 416-440 (1989)A remotely accessible network processor-based router for network experimentation., , , , , , , , , and 4 other author(s). ANCS, page 20-29. ACM, (2008)