Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applicability of SIGNAL in safety critical system development., and . IEE Proc. Softw., 146 (2): 86-95 (1999)Component Security - Issues and an Approach.. COMPSAC (2), page 152-155. IEEE Computer Society, (2005)0-7695-2413-3.Risk Based Security Analysis of Permissions in RBAC., and . WOSIS, page 332-341. INSTICC Press, (2004)A Fault Tolerant Mechanism for Partitioning and Offloading Framework in Pervasive Environments., , and . CoRR, (2021)A Dynamic Load Balancing Algorithm for Distributing Mobile Codes in Multi-Applications and Multi-Hosts Environment., , and . CoRR, (2020)Towards a Generic Application Partitioning and Retraction Framework for Pervasive Environments., , and . CoRR, (2014)Finite-State Modeling, Analysis and Testing of System Vulnerabilities., , and . ARCS Workshops, volume P-41 of LNI, page 19-33. GI, (2004)An Effective Approach to Parse SOAP Messages on Mobile Clients., , and . MobiWIS, volume 8093 of Lecture Notes in Computer Science, page 9-21. Springer, (2013)Jitter Control in On-Line Scheduling of Dependent Real-Time Tasks., , and . RTSS, page 49-58. IEEE Computer Society, (2001)Design for safety in Safecharts with risk ordering of states, and . Safety Science, 40 (9): 753--763 (December 2002)