Author of the publication

Automated Generation of Resource Configurations through Policies.

, , , and . POLICY, page 107-110. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated policy-based resource construction in utility computing environments., , , and . NOMS (1), page 381-393. IEEE, (2004)Model-Driven Software Verification., and . SPIN, volume 2989 of Lecture Notes in Computer Science, page 76-91. Springer, (2004)A Semantic Approach to Secure Information Flow., and . MPC, volume 1422 of Lecture Notes in Computer Science, page 254-271. Springer, (1998)Theorem Proving Using Lazy Proof Explication., , , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 355-367. Springer, (2003)Simulated Annealing Based Integerization of Hidden Weights for Area-Efficient IoT Edge Intelligence., , and . iSES, page 427-432. IEEE, (2022)Analysis of Radiation Impact on Memristive Crossbar Arrays., , and . LASCAS, page 1-4. IEEE, (2020)Model driven code checking., , and . Autom. Softw. Eng., 15 (3-4): 283-297 (2008)Modeling and Monitoring of Hierarchical State Machines in Scala., and . SERENE, volume 10479 of Lecture Notes in Computer Science, page 21-36. Springer, (2017)Toward a theory of maximally concurrent programs (shortened version)., and . PODC, page 319-328. ACM, (2000)Towards a Logic for Inferring Properties of Event Streams., , and . ISoLA (2), volume 9953 of Lecture Notes in Computer Science, page 394-399. (2016)