Author of the publication

Automated Multi-graceful Degradation: A Case Study.

, and . SRDS, page 81-90. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Component Based Design of Multitolerant Systems., and . IEEE Trans. Software Eng., 24 (1): 63-78 (1998)Education: Interactive Distributed Applications and the Computer Science Curriculum., , , , and . IEEE Distributed Systems Online, (2002)Monitoring Partially Synchronous Distributed Systems Using SMT Solvers., , , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 277-293. Springer, (2017)Brief Announcement: Verification of Stabilizing Programs with SMT Solvers., and . SSS, volume 7596 of Lecture Notes in Computer Science, page 179-182. Springer, (2012)Logarithmic Keying of Communication Networks., , and . SSS, volume 4280 of Lecture Notes in Computer Science, page 314-323. Springer, (2006)Automated Addition of Fault-Tolerance under Synchronous Semantics., , and . SSS, volume 8255 of Lecture Notes in Computer Science, page 266-280. Springer, (2013)Stabilizing Causal Deterministic Merge., and . WSS, volume 2194 of Lecture Notes in Computer Science, page 183-199. Springer, (2001)Revising UNITY Programs: Possibilities and Limitations., , and . OPODIS, volume 3974 of Lecture Notes in Computer Science, page 275-290. Springer, (2005)Ensuring Average Recovery with Adversarial Scheduler., , and . OPODIS, volume 46 of LIPIcs, page 23:1-23:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)