Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Heuristic for Partitioning Parallel Computation., and . Parallel and Distributed Computing and Systems, page 295-297. IASTED/ACTA Press, (1995)Trust mechanisms for cloud computing., and . J. Cloud Comput., (2013)Discrete-Event Simulation of Fluid Stochastic Petri Nets., , and . IEEE Trans. Software Eng., 25 (2): 207-217 (1999)Performance analysis of real traffic carried with encrypted cover flows: Invited talk 2.. SpringSim, page 827. SCS/ACM, (2008)Dynamic Remapping of Parallel Computations with Varying Resource Demands., and . IEEE Trans. Computers, 37 (9): 1073-1087 (1988)PolicyGlobe: a framework for integrating network and operating system security policies., , and . SafeConfig, page 53-62. ACM, (2009)unFriendly: Multi-party Privacy Risks in Social Networks., , and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 236-252. Springer, (2010)Extensions of Network Reliability Analysis., , and . DSN, page 88-99. IEEE, (2019)Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , and . ICC, page 1-7. IEEE, (2018)Optimistic Parallel Simulation of Continuous Time Markov Chains Using Uniformization., and . J. Parallel Distributed Comput., 18 (4): 395-410 (1993)