Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of an Extensible Network Testbed., , , , and . NCA, page 117-124. IEEE Computer Society, (2010)Refinement of Safety-Related Hazards into Verifiable Code Assertions., and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 345-358. Springer, (1998)Root cause analysis and diagnosis in SOA and cloud environments., , , and . CASCON, page 335-336. ACM, (2009)Computer crime - Risk management and computer security.. Comput. Secur., 4 (4): 287-295 (1985)Improving Predictable Shared-Disk Clusters Performance for Database Clouds., , , , , , , and . ICDE, page 237-242. IEEE Computer Society, (2017)On Integrating Visualization Techniques for Effective Software Exploration, , , and . Intl Conf. on Information Visualization, page 38--45. Phoenix, AZ, (1997)Workshop on graphical documentation for programmers., and . SIGDOC, page 234-235. ACM, (2002)Looking at Code With Your Safety Goggles On.. Ada-Europe, volume 1411 of Lecture Notes in Computer Science, page 251-262. Springer, (1998)On the effect of subliminal priming on subjective perception of images: A machine learning approach., , , , , , , , and . EMBC, page 5438-5441. IEEE, (2014)Operational experience with a virtual networking laboratory., , , and . SIGCSE, page 427-431. ACM, (2008)