Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating service resource consumption from response time measurements., , , and . VALUETOOLS, page 48. ICST/ACM, (2009)Building accurate workload models using Markovian arrival processes.. SIGMETRICS, page 357-358. ACM, (2011)Generalized Synchronizations and Capacity Constraints for Java Modelling Tools., , , , , and . ICPE, page 169-170. ACM, (2017)GIVS: Integrity Validation for Grid Security., and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 147-154. Springer, (2005)A class of tractable models for run-time performance evaluation., and . ICPE, page 63-74. ACM, (2012)Enhancing Big Data Application Design with the DICE Framework., and . ESOCC Workshops, volume 824 of Communications in Computer and Information Science, page 164-168. Springer, (2017)Evaluating Weighted Round Robin Load Balancing for Cloud Web Services., and . SYNASC, page 393-400. IEEE Computer Society, (2014)A Queueing Network Model for Performance Prediction of Apache Cassandra., , and . VALUETOOLS, ACM, (2016)Line: Evaluating Software Applications in Unreliable Environments., and . IEEE Trans. Reliability, 66 (3): 837-853 (2017)Interarrival Times Characterization and Fitting for Markovian Traffic Analysis., , and . Numerical Methods for Structured Markov Chains, volume 07461 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)