Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mission-aware time-dependent cyber asset criticality and resilience., and . CSIIRW, page 12. ACM, (2013)Tracking Files in the Kepler Provenance Framework., , , , and . SSDBM, volume 5566 of Lecture Notes in Computer Science, page 273-282. Springer, (2009)Fault-Tolerance in Dataflow-Based Scientific Workflow Management., , , , and . SERVICES, page 336-343. IEEE Computer Society, (2010)On High-Assurance Scientific Workflows., and . HASE, page 73-82. IEEE Computer Society, (2011)Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks., and . ICNC, page 58-62. IEEE, (2014)Automation of Network-Based Scientific Workflows., , , , , , , , , and 5 other author(s). Grid-Based Problem Solving Environments, volume 239 of IFIP, page 35-61. Springer, (2006)A Fault-Tolerance Architecture for Kepler-Based Distributed Scientific Workflows., , , , and . SSDBM, volume 6187 of Lecture Notes in Computer Science, page 452-460. Springer, (2010)Collaborative monitoring and analysis for simulation scientists., , , , , , , , and . CTS, page 235-244. IEEE, (2010)Modeling impact of attacks, recovery, and attackability conditions for situational awareness., , , , and . CogSIMA, page 181-187. IEEE, (2014)Collaboration portal for petascale simulations., , , , and . CTS, page 384-393. IEEE Computer Society, (2009)