Author of the publication

Data-Intensive Services for Real-Time Systems.

, , and . Handbook of Real-Time and Embedded Systems, Chapman and Hall/CRC, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithm for Concurrency Control in Replicated Databases., and . Comput. Syst. Sci. Eng., 1 (2): 75-81 (1986)Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems., , , and . Comput. J., 42 (8): 674-692 (1999)Asym-MAC: A MAC Protocol for Low-Power Duty-Cycled Wireless Sensor Networks with Asymmetric Links., , and . IEEE Communications Letters, 18 (5): 809-812 (2014)A Software Prototyping Environment and Its Use in Developing a Multiversion Distributed Database System., and . ICPP (2), page 81-88. Pennsylvania State University Press, (1989)0-271-00686-2.The Cogency Monitor: An External Interface Architecture for a Distributed Object-Oriented Real-Time Database System., , and . IEEE Real Time Technology and Applications Symposium, page 71-78. IEEE Computer Society, (1998)Performance Evaluation on a Real-Time Database., , and . IEEE Real Time Technology and Applications Symposium, page 253-265. IEEE Computer Society, (2002)Intrusion Detection in Real-Time Database Systems via Time Signatures., , and . IEEE Real Time Technology and Applications Symposium, page 124-133. IEEE Computer Society, (2000)WiTraffic: Low-Cost and Non-Intrusive Traffic Monitoring System Using WiFi., , and . ICCCN, page 1-9. IEEE, (2017)Cooperative Data Scheduling in Hybrid Vehicular Ad Hoc Networks: VANET as a Software Defined Network., , , , and . IEEE/ACM Trans. Netw., 24 (3): 1759-1773 (2016)Lightweight Authentication Method for Controller Area Network., , , and . RTCSA, page 101. IEEE Computer Society, (2016)