Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Spot-Checking for Collusion Tolerance in Computer Grids., , and . IEEE Trans. Dependable Secur. Comput., 16 (2): 301-312 (2019)Connectivity modeling and optimization of linear consecutively connected systems with repairable connecting elements., and . Eur. J. Oper. Res., 264 (2): 732-741 (2018)BDD-based reliability evaluation of phased-mission systems with internal/external common-cause failures., and . Reliab. Eng. Syst. Saf., (2013)Incorporating Common-Cause Failures Into the Modular Hierarchical Systems Analysis., , , and . IEEE Trans. Reliability, 58 (1): 10-19 (2009)m/nCCS: linear consecutively connected systems subject to combined gap constraints., , , and . Int. J. General Systems, 44 (7-8): 833-848 (2015)Mission Aborting Policies and Multiattempt Missions., and . IEEE Trans. Reliab., 73 (1): 51-52 (March 2024)Reliability Analysis of Dynamic Load-Sharing Systems With Constrained and Changing Component Performances., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (9): 5897-5909 (September 2023)QoS reliability of hierarchical clustered wireless sensor networks., and . IPCCC, IEEE, (2006)An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN)., , , and . ICC, page 1-5. IEEE, (2011)MBDD versus MMDD for Multistate Systems Analysis., , and . DASC, page 172-180. IEEE Computer Society, (2007)