Author of the publication

Correctness and access time properties of an extended token ring protocol.

, and . ICCC, page 402-407. International Council for Computer Communication / Elsevier, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lookahead Network.. IEEE Trans. Commun., 33 (11): 1160-1170 (1985)Lookahead networks., , and . AFIPS National Computer Conference, volume 51 of AFIPS Conference Proceedings, page 153-165. AFIPS Press, (1982)Modeling of Correlated Failures and Community Error Recovery in Multiversion Software., and . IEEE Trans. Software Eng., 16 (3): 350-359 (1990)A formalism for monitoring real-time constraints at run-time., and . FTCS, page 148-155. IEEE Computer Society, (1990)Sensitivity Analysis of Continuous Time Markov Chains Using Uniformization., and . Computer Performance and Reliability, page 93-104. North-Holland, (1987)Fast Simulation of Highly Dependable Systems with General Failure and Repair Processes., , , and . IEEE Trans. Computers, 42 (12): 1440-1452 (1993)DB2 Parallel Edition., , , , , , , and . IBM Syst. J., 34 (2): 292-322 (1995)Variance reduction in mean time to failure simulations., , , , and . WSC, page 491-499. ACM, (1988)Correctness and access time properties of an extended token ring protocol., and . ICCC, page 402-407. International Council for Computer Communication / Elsevier, (1988)A Unified Framework for Simulating Markovian Models of Highly Dependable Systems., , , , and . IEEE Trans. Computers, 41 (1): 36-51 (1992)