From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture., , , и . DSN, стр. 453-. IEEE Computer Society, (2004)Kava - a powerful and portable reflective Java (poster session)., и . OOPSLA Addendum, стр. 123-124. ACM, (2000)From Dalang to Kava - The Evolution of a Reflective Java Extension., и . Reflection, том 1616 из Lecture Notes in Computer Science, стр. 2-21. Springer, (1999)A Reflective Java Class Loader., и . ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 374-375. Springer, (1998)Security-Informed Safety: Supporting Stakeholders with Codes of Practice., , , и . Computer, 51 (8): 60-65 (2018)Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis., , , , , , , , и . SAFECOMP (Workshops), том 14989 из Lecture Notes in Computer Science, стр. 173-187. Springer, (2024)Dynamic Adaptation of the Security Properties of Applications and Components., и . ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 282. Springer, (1998)Making distributed systems work: position paper for Amsterdam workshop., , и . ACM SIGOPS European Workshop, ACM, (1986)Using Metaobject Protocols to Implement Atomic Data Types., и . ECOOP, том 952 из Lecture Notes in Computer Science, стр. 168-189. Springer, (1995)The first international workshop on dependability of clouds, data centers and virtual computing environments: DCDV 2011., , , и . DSN Workshops, стр. 97-98. IEEE Computer Society, (2011)