Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-threat intelligence for security decision-making: A review and research agenda for practice., , , and . Comput. Secur., (September 2023)From UML to IDL: A Case Study., , and . TOOLS (28), page 141-. IEEE Computer Society, (1998)Adding Semantics to Interface Definition Languages., and . Australian Software Engineering Conference, page 66-78. IEEE Computer Society, (1998)Comparisons between CORBA IDL & COM/DCOM MIDL: Interfaces for Distributed Computing., , and . TOOLS (25), page 15-32. IEEE Computer Society, (1997)Distributed Logging for Transaction Processing., , and . SIGMOD Conference, page 82-96. ACM Press, (1987)SIGMOD Record 16(3), December 1987.A Modular Architecture for Distributed Transaction processing., , and . USENIX Winter, page 357-363. USENIX Association, (1991)High Performance Distributed Transaction Processing in a General Purpose Computing Environment., , , , , , , and . HPTS, volume 359 of Lecture Notes in Computer Science, page 220-242. Springer, (1987)The Camelot Project., , , , , , , and . IEEE Database Eng. Bull., 9 (3): 23-34 (1986)