Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)A General Methodology for Robotic Haptic Recognition of 3-D Objects., and . ICEIS, page 203-210. (1999)Blocking time under basic priority inheritance: Polynomial bound and exact computation., , and . CoRR, (2018)Confining the Insider Threat in Mass Virtual Hosting Systems., , and . WOSIS, page 105-114. INSTICC Press, (2007)A hybrid system for knowledge-based synthesis of robot grasps., , , and . IROS, page 1575-1581. IEEE, (1993)Efficient authentication and verification of certificate status within public-key infrastructures., and . Communications, Internet, and Information Technology, page 182-188. IASTED/ACTA Press, (2004)Precise Worst-Case Blocking Time of Tasks Under Priority Inheritance Protocol., and . IEEE Trans. Computers, 70 (11): 1901-1913 (2021)A flexible scheme for on-line public-key certificate status updating and verification., and . ISCC, page 891-898. IEEE Computer Society, (2002)MININET: A Local Area Network for Real-Time Instrumentation Applications., , , , , and . Comput. Networks, (1984)Architectural design patterns for logic control of manufacturing systems: The generalized device., , , , and . ICAT, page 1-7. IEEE, (2009)