Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)Maintaining Digital Clocks in Step., , and . Parallel Process. Lett., (1991)Convergence of Iteration Systems., , , and . Distributed Comput., 7 (1): 43-53 (1993)Logarithmic keying., , and . ACM Trans. Auton. Adapt. Syst., 3 (4): 18:1-18:18 (2008)Stabilization of Grid Routing in Sensor Networks., , , and . J. Aerosp. Comput. Inf. Commun., 3 (5): 214-233 (2006)Protocol Validation by Maximal Progress State Exploration., and . IEEE Trans. Commun., 32 (1): 94-97 (1984)Stabilization of Flood Sequencing Protocols in Sensor Networks., , and . IEEE Trans. Parallel Distributed Syst., 21 (7): 1042-1055 (2010)Token Systems that Self-Stabilize., , and . IEEE Trans. Computers, 38 (6): 845-852 (1989)On Constructing Multi-Phase Communication Protocols., , and . PSTV, page 57-68. North-Holland, (1984)Deadlock Detection for a Class of Communicating Finite State Machine., and . PSTV, page 319. North-Holland, (1982)