Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

n-Modular Redundant Real-Time Middleware: Design and Implementation., , , and . EWiLi, volume 1697 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)File allocation for a parallel Webserver., , , and . HiPC, page 16-21. IEEE Computer Society, (1996)Fast Simulation of a Voice-Data Multiplexer., and . INFOCOM, page 361-368. IEEE Computer Society, (1995)Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks., , , and . J. Parallel Distributed Comput., 57 (1): 1-13 (1999)A compiler-hardware approach to software protection for embedded systems., , , and . Comput. Electr. Eng., 35 (2): 315-328 (2009)HomeOS: Context-Aware Home Connectivity., , , , and . International Conference on Wireless Networks, page 739-744. CSREA Press, (2004)Automation for Creating and Configuring Security Manifests for Hardware Containers., , and . SafeConfig, IEEE, (2011)Second Derivative Algorithms for Optimal Resource Allocation in Distributed Computer Systems., and . ICDCS, page 56-63. IEEE Computer Society, (1987)No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains., , , and . DSD, page 163-170. IEEE Computer Society, (2012)PyLOM: a language and run-time system for planning applications., , and . SPLASH (Companion Volume), page 91-92. ACM, (2013)