Author of the publication

Using Model Checking Techniques For Evaluating the Effectiveness of Evolutionary Computing in Synthesis of Distributed Fault-Tolerant Programs.

, and . GECCO, page 1119-1126. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional Design of Multitolerant Repetitive Byzantine Agreement., and . FSTTCS, volume 1346 of Lecture Notes in Computer Science, page 169-183. Springer, (1997)ProSe: A Programming Tool for Rapid Prototyping of Sensor Networks., and . S-CUBE, volume 24 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 158-173. Springer, (2009)Automating the Addition of Fault-Tolerance., and . FTRTFT, volume 1926 of Lecture Notes in Computer Science, page 82-93. Springer, (2000)Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 82-96. Springer, (2008)Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)Ensuring Average Recovery with Adversarial Scheduler., , and . OPODIS, volume 46 of LIPIcs, page 23:1-23:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Logarithmic keying., , and . ACM Trans. Auton. Adapt. Syst., 3 (4): 18:1-18:18 (2008)The Complexity of Adding Multitolerance., , and . ACM Trans. Auton. Adapt. Syst., 9 (3): 15:1-15:33 (2014)Component Based Design of Multitolerant Systems., and . IEEE Trans. Software Eng., 24 (1): 63-78 (1998)Education: Interactive Distributed Applications and the Computer Science Curriculum., , , , and . IEEE Distributed Systems Online, (2002)