Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Management and Accounting in an International Cellular Network., , , and . Integrated Network Management, volume C-12 of IFIP Transactions, page 193-206. North-Holland, (1993)The CONIC Communication System for Distributed Process Control.. Kommunikation in Verteilten Systemen, volume 60 of Informatik-Fachberichte, page 637-657. Springer, (1983)Reconciling role based management and role based access control., and . ACM Workshop on Role-Based Access Control, page 135-141. ACM, (1997)Adaptive self-management of teams of autonomous vehicles., , , , and . MPAC, page 1-6. ACM, (2008)A Case Study in Representing a Model: to Z or not to Z?, and . Z User Workshop, page 254-268. Springer, (1990)Constraint-Based Configuration of Proxylets for Programmable Networks., and . IDMS, volume 2158 of Lecture Notes in Computer Science, page 245-256. Springer, (2001)Adaptive response system for distributed denial-of-service attacks., , and . Integrated Network Management, page 809-814. IEEE, (2009)A Mission Management Framework for Unmanned Autonomous Vehicles., , , , and . MOBILWARE, volume 7 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-235. Springer, (2009)Content-Dependent Access Control., and . ACM SIGOPS Oper. Syst. Rev., 25 (2): 63-70 (1991)Towards a Role-Based Framework for Distributed Systems Management., and . J. Netw. Syst. Manag., 5 (1): 5-30 (1997)