Author of the publication

On the Methods to Detect Sector Faults of a Disk Subsystem.

, , and . MASCOTS, page 317-322. The Society for Computer Simulation, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling Policies for Fault Tolerance in a VLSI Processor., , , and . DFT, page 1-9. IEEE Computer Society, (1994)Threshold-Based Registration (TBR) in Mobile IPv6., , , and . Mobile and Wireless Communication Networks, volume 1818 of Lecture Notes in Computer Science, page 150-157. Springer, (2000)Chain reduction of authorisation certificates., , , and . Int. J. Secur. Networks, 10 (2): 107-123 (2015)A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System., , , and . CyCom, page 265-284. IEEE, (2022)On a new approach for enhancing the fault coverage of conformance testing of protocols., , and . SPDP, page 428-435. IEEE Computer Society, (1991)Repair algorithms for mirrored disk systems., , , and . DFT, page 216-224. IEEE Computer Society, (1995)Generating non-standard random distributions for discrete event simulation systems., , and . Simul. Pract. Theory, 1 (4): 173-193 (1994)Scenario-driven design considerations for MANET protocols (short paper)., , and . DAIS, volume 143 of IFIP Conference Proceedings, page 205-212. Kluwer, (1999)On the Methods to Detect Sector Faults of a Disk Subsystem., , and . MASCOTS, page 317-322. The Society for Computer Simulation, (1993)Ad hoc routing protocol's performance: a realistic simulation based study., and . Telecommun. Syst., 33 (1-3): 269-289 (2006)