Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test case generation for the task tree type of architecture., and . Inf. Softw. Technol., 52 (6): 697-706 (2010)Performance comparison of node-redundant multicast distribution trees in SDN networks., , and . NetSys, page 1-8. IEEE, (2017)iPRP - The Parallel Redundancy Protocol for IP Networks: Protocol Design and Operation., , , and . IEEE Trans. Ind. Informatics, 12 (5): 1842-1854 (2016)Use of Tsallis entropy in detection of SYN flood DoS attacks., , and . Secur. Commun. Networks, 8 (18): 3634-3640 (2015)Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks., , and . Secur. Commun. Networks, 8 (5): 837-844 (2015)A Learning Model for Lifelong Education of Computer Engineers., , and . IEEE Access, (2023)Complete formal verification of the PSTM transaction Scheduler., , , and . Comput. Sci. Inf. Syst., 20 (1): 307-327 (2023)Dynamic scheduling in distributed transactional memory., , , and . Distributed Comput., 35 (1): 19-36 (2022)Redundancy in Communication Networks for Smart Grids.. EPFL, Switzerland, (2016)A Federated Learning Algorithms Development Paradigm., , , , and . ECBS, volume 14390 of Lecture Notes in Computer Science, page 26-41. Springer, (2023)