From post

Detecting Diamond Necklaces in Labeled Dags (A Problem from Distributed Debugging).

, и . WG, том 1197 из Lecture Notes in Computer Science, стр. 211-223. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications., , , и . SEC, том 562 из IFIP Advances in Information and Communication Technology, стр. 49-63. Springer, (2019)Using Agreement Services in Grid Computing., , , и . ISPA Workshops, том 4331 из Lecture Notes in Computer Science, стр. 165-174. Springer, (2006)Reconstruction Attack through Classifier Analysis., , и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 274-281. Springer, (2012)Design and Performance Evaluation of a Resource Allocation System Based on Agreement Services., и . SYNASC, стр. 387-393. IEEE Computer Society, (2008)Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection., , , , и . EDCC, стр. 53-64. IEEE Computer Society, (2016)A Fault-Tolerant Protocol for Resource Allocation in a Grid Dedicated to Genomic Applications., , , и . PPAM, том 3019 из Lecture Notes in Computer Science, стр. 1154-1161. Springer, (2003)Designing Modular Services in the Scattered Byzantine Failure Model., , , , и . ISPDC/HeteroPar, стр. 262-269. IEEE Computer Society, (2004)Asynchronous Protocols to Meet Real-Time Constraints: Is It Really Sensible? How to Proceed?, и . ISORC, стр. 290-297. IEEE Computer Society, (1998)AMORES: an architecture for mobiquitous resilient systems., , , , , , , , , и 4 other автор(ы). ARMOR, стр. 7:1-7:6. ACM, (2012)Detecting Diamond Necklaces in Labeled Dags (A Problem from Distributed Debugging)., и . WG, том 1197 из Lecture Notes in Computer Science, стр. 211-223. Springer, (1996)