Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static verification of security requirements in role based CSCW systems., and . SACMAT, page 196-203. ACM, (2003)A Framework for Programming Robust Context-Aware Applications., and . IEEE Trans. Software Eng., 36 (2): 184-197 (2010)Design of the Ajanta system for mobile agent programming., , , , , , , and . J. Syst. Softw., 62 (2): 123-140 (2002)A Performance Model of a Fault-Tolerant Distributed System for Evaluating Reliability Mechanisms., , , , and . Int. CMG Conference, page 363-378. Computer Measurement Group, (1985)Embedding of Cycles in Arrangement Graphs., and . IEEE Trans. Computers, 42 (8): 1002-1006 (1993)Scalable Transaction Management for Partially Replicated Data in Cloud Computing Environments., and . CLOUD, page 260-267. IEEE Computer Society, (2016)The Guardian Model for Exception Handling in Distributed Systems., and . SRDS, page 304-. IEEE Computer Society, (2002)Improved Diagnosability Algorithms., and . IEEE Trans. Computers, 40 (2): 143-153 (1991)Specification and verification of security requirements in a programming model for decentralized CSCW systems., and . ACM Trans. Inf. Syst. Secur., 10 (2): 7 (2007)Arrangement Graphs: A Class of Generalized Star Graphs., and . Inf. Process. Lett., 42 (5): 235-241 (1992)