Author of the publication

Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning.

, , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CROSS City: Wi-Fi Location Proofs for Smart Tourism., , and . ADHOC-NOW, volume 12338 of Lecture Notes in Computer Science, page 241-253. Springer, (2020)MultiTLS: Secure communication channels with cipher suite diversity., , , and . IACR Cryptol. ePrint Arch., (2020)μVerum: Intrusion Recovery for Microservice Applications., , , and . IEEE Access, (2023)Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning., , , and . IEEE Access, (2023)STOP: A Location Spoofing Resistant Vehicle Inspection System., , , and . ADHOC-NOW, volume 12338 of Lecture Notes in Computer Science, page 100-113. Springer, (2020)Smart Web Services: systems integration using policy driven automatic configuration, and . Conf. on Enterprise Information Systems (CENTERIS), (June 2010)Towards the Internet of Things: An Introduction to RFID Technology, and . 4th Int'l Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT), page 69-78. SciTePress, (June 2010)Performance assessment of the STEP Framework. Instituto Superior Técnico, Technical University of Lisbon, (November 2010)Vulnerability-Tolerant Transport Layer Security., , and . OPODIS, volume 95 of LIPIcs, page 28:1-28:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service., , , and . IEEE Trans. Cloud Comput., 11 (2): 2011-2027 (April 2023)