Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Time Efficiency of a Communication Protocol.. PSTV, page 527-539. North-Holland, (1984)Predicting protocol performance from a meta-implementation., , and . PSTV, page 349-362. North-Holland, (1985)A Queuing Model of a Time-Sliced Priority-Driven Task Dispatching Algorithm., , and . IEEE Trans. Software Eng., 6 (2): 219-225 (1980)Symbolic Methods for the State Space Exploration of GSPN Models., , and . Computer Performance Evaluation / TOOLS, volume 2324 of Lecture Notes in Computer Science, page 188-199. Springer, (2002)A Queueing Model of a Timesliced Priority Driven Task Dispatching Algorithm., , and . Performance, page 473-486. North-Holland, (1979)Performance Modelling with the Formal Specification Language SDL., , , and . FORTE, volume 69 of IFIP Conference Proceedings, page 213-228. Chapman & Hall, (1996)A Theorem in the Theory of Compromise Merge Methods., and . J. ACM, 21 (1): 157-160 (1974)Traffic-Centric Modelling by IEEE 802.11 DCF Example., and . ASMTA, volume 6751 of Lecture Notes in Computer Science, page 219-233. Springer, (2011)Analysis of structured use case models through model checking., and . South Afr. Comput. J., (2005)A probabilistic dynamic technique for the distributed generation of very large state spaces., , , and . Perform. Evaluation, 39 (1-4): 127-148 (2000)