From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risks of Sharing Cyber Incident Information., , и . ARES, стр. 58:1-58:10. ACM, (2018)A Fault-Tolerant Architectural Approach for Dependable Systems., , и . IEEE Software, 23 (2): 80-87 (2006)Analysing failure behaviours in component interaction.. J. Syst. Softw., 71 (1-2): 97-115 (2004)Incorporating architecture-based self-adaptation into an adaptive industrial software system., , , , , , и . J. Syst. Softw., (2016)Self-adaptive authorisation in OpenStack cloud platform., , , и . J. Internet Serv. Appl., 9 (1): 19:1-19:17 (2018)Human in the loop: what is the point of no return?. SEAMS@ICSE, стр. 165-166. ACM, (2020)Software engineering for large-scale multi-agent systems - SELMAS 2004: workshop report., , , , , , , , , и . ACM SIGSOFT Softw. Eng. Notes, 29 (5): 1-10 (2004)Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures., и . Future Gener. Comput. Syst., (2020)An Adaptive Classification Framework for Unsupervised Model Updating in Nonstationary Environments., , , , и . MOD, том 9432 из Lecture Notes in Computer Science, стр. 171-184. Springer, (2015)Workshop on Safety: Computer Systems in Critical Applications., и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 362. Springer, (2003)