Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software performability - from concepts to applications., , and . The Kluwer international series in engineering and computer science Kluwer, (1996)Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical Systems., , , , and . ISSRE, page 51-60. IEEE Computer Society, (2009)Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?, and . HASE, page 115. IEEE Computer Society, (1999)On Low-Cost Error Containment and Recovery Methods for Guarded Software Upgrading., , , , and . ICDCS, page 548-555. IEEE Computer Society, (2000)Developing a Data Driven Prognostic System with Limited System Information., , , , and . HASE, page 281-282. IEEE Computer Society, (2004)On the effectiveness of a message-driven confidence-driven protocol for guarded software upgrading., , , , and . Perform. Evaluation, 44 (1-4): 211-236 (2001)A Design-Diversity Based Fault-Tolerant COTS Avionics Bus Network., , and . PRDC, page 35-44. IEEE Computer Society, (2001)GSU middleware architecture design., , , , and . HASE, page 212-215. IEEE Computer Society, (2000)QoS Adaptive ISHM Systems., , , , , , , and . ICTAI, page 47-54. IEEE Computer Society, (2006)Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach., , , , and . DSN, page 561-570. IEEE Computer Society, (2002)