Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended Stochastic Petri Nets: Applications and Analysis., , , and . Performance, page 507-519. North-Holland, (1984)A Decision Model for Closed Queuing Networks., and . IEEE Trans. Software Eng., 5 (4): 328-332 (1979)Performability Analysis of Multistate Computing Systems Using Multivalued Decision Diagrams., , , , and . IEEE Trans. Computers, 59 (10): 1419-1433 (2010)Coverage Modeling for Dependability Analysis of Fault-Tolerant Systems., and . IEEE Trans. Computers, 38 (6): 775-787 (1989)Security modeling and quantification of intrusion tolerant systems using attack-response graph., and . J. High Speed Networks, 13 (4): 297-308 (2004)Reliability and Availability Assessment in Practice.. DS-RT, page 1. IEEE, (2019)An Empirical Study of Fault Triggers in the Linux Operating System: An Evolutionary Perspective., , , , , and . IEEE Trans. Reliability, 68 (4): 1356-1383 (2019)A method for multiple channel recovery in TDMA wireless communications systems., , and . Comput. Commun., 24 (12): 1147-1157 (2001)Performance modeling of wireless networks with generally distributed handoff interarrival times., , and . Comput. Commun., 26 (15): 1747-1755 (2003)The effect of Web caching on network planning., , and . Comput. Commun., 22 (14): 1343-1350 (1999)