From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting compromised routers via packet forwarding behavior., , и . IEEE Netw., 22 (2): 34-39 (2008)Detecting Malicious Packet Losses., , и . IEEE Trans. Parallel Distributed Syst., 20 (2): 191-206 (2009)Highly-Available Services Using the Primary-Backup Approach., и . Workshop on the Management of Replicated Data, стр. 47-50. IEEE Computer Society Press, (1992)Position Paper - Deceit: A Flexible Distributed File System., , и . Workshop on the Management of Replicated Data, стр. 15-17. IEEE Computer Society Press, (1990)High availability in a real-time system., , , и . ACM SIGOPS European Workshop, ACM, (1992)Practical and low-overhead masking of failures of TCP-based servers., , , и . ACM Trans. Comput. Syst., 27 (2): 4:1-4:39 (2009)Scalable Causal Message Logging for Wide-Area Environments., , и . Euro-Par, том 2150 из Lecture Notes in Computer Science, стр. 864-873. Springer, (2001)Designing Algorithms for Dependent Process Failures., и . Future Directions in Distributed Computing, том 2584 из Lecture Notes in Computer Science, стр. 24-28. Springer, (2003)Coterie Availability in Sites., и . DISC, том 3724 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2005)An Extensible Software Architecture for Mobile Components., , и . ECBS, стр. 231-237. IEEE Computer Society, (2002)