Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System Restore in a Multi-cloud Data Pipeline Platform., , , , , , , , , and 2 other author(s). DSN (Industry Track), page 21-24. IEEE, (2019)Self-organization Data Gathering for Wireless Sensor Networks., , , , , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 650-661. Springer, (2006)Riemannian Multi-Manifold Modeling., , and . CoRR, (2014)Correctness of aspect-oriented business process modeling., , , , and . Business Proc. Manag. Journal, 24 (2): 537-566 (2018)Trustworthiness requirement-oriented software process modeling., , and . Journal of Software: Evolution and Process, (2018)Physical Layer Secret Key Capacity of Two Moving Terminals., , , and . VTC Spring, page 1-6. IEEE, (2017)A quantitative analysis of quorum system availability in data centers., , , and . IWQoS, page 99-104. IEEE, (2014)Simultaneous global external and internal stabilization of linear time-invariant discrete-time systems subject to actuator saturation., , , and . Autom., 48 (5): 699-711 (2012)On the tradeoff of availability and consistency for quorum systems in data center networks., , , and . Comput. Networks, (2015)Towards Efficient Deployment of Cloud Applications through Dynamic Reverse Proxy Optimization., , , and . HPCC/EUC, page 651-658. IEEE, (2013)