Author of the publication

Handling interdependent values in an auction mechanism for bandwidth allocation in tactical data networks.

, , , , , and . NetEcon, page 73-78. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the Behavior of a Highly Configurable Component Based Real-Time System., , , , and . ECRTS, page 57-68. IEEE Computer Society, (2008)Secure Software Architecture, Design, Implementation and Assurance., , and . HICSS, page 279. IEEE Computer Society, (2007)Adaptive Quality of Service in ad hoc wireless networks., , , and . WCNC, page 1749-1754. IEEE, (2012)Introduction to Software Security for Mobile Platforms Minitrack., and . HICSS, page 5069. IEEE Computer Society, (2014)Complex COTS-based software systems: practical steps for their maintenance., , and . Journal of Software Maintenance, 12 (6): 357-376 (2000)Real-Time Computing with Off-the-Shelf Components: The Case for CORBA., , , and . Scalable Computing: Practice and Experience, (1999)Modernizing Legacy Systems - Software Technologies, Engineering Processes, and Business Practices., , and . SEI series in software engineering Addison-Wesley, (2003)Mechanism design for sensor fusion: tactical networks as a foil for ultra large scale systems., , and . ULSSIS@ICSE, page 53-56. ACM, (2008)Measuring Software Sustainability., , , , , , , and . ICSM, page 450-. IEEE Computer Society, (2003)Trust and vulnerability in open source software., , and . IEE Proc. Softw., 149 (1): 47-51 (2002)