Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing the Intrusion Detection Exchange Protocol., , , , , , and . ACSAC, page 32-41. IEEE Computer Society, (2001)Grid-enabling a vibroacoustic analysis toolkit., , , , , , , , , and 1 other author(s). Int. J. High Perform. Comput. Netw., 5 (3): 168-178 (2008)Decoy-state quantum key distribution with direct modulated commercial off-the-shelf VCSEL lasers., , , , , , , and . QCE, page 205-211. IEEE, (2020)Improving the security of Android inter-component communication., , , , , , , , , and . IM, page 808-811. IEEE, (2013)The Evolution of the NOMS-IM Symposia Series: From a Gleam in the Eye to Multiple Technical Activities.. J. Netw. Syst. Manag., 15 (4): 569-579 (2007)Decentralizing control and intelligence in network management., , , , , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 4-16. Chapman & Hall, (1995)An Architecture Driven Comparison of Network Management Systems., , , , , , and . Integrated Network Management, volume C-12 of IFIP Transactions, page 479-491. North-Holland, (1993)Grid-enabling a vibroacoustic analysis application., , , , , , , , , and . GRID, page 33-39. IEEE Computer Society, (2005)Performance modeling and analysis for a large heterogeneous distributed system: UCLA-SEASnet., , , and . ACM Conference on Computer Science, page 397. ACM, (1989)A Dual Priority MVA Model for a Large Distributed System: LOCUS., , and . Performance, page 51-66. North-Holland, (1984)