Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized Mobile Search and Retrieval Using SMS and HTTP to Support Social Change., , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 152-171. Springer, (2011)MAgNET: Mobile Agents for Networked Electronic Trading., , , and . IEEE Trans. Knowl. Data Eng., 11 (4): 509-525 (1999)An Automata-Theoretic Decision Procedure for Future Interval Logic., , , , and . FSTTCS, volume 652 of Lecture Notes in Computer Science, page 51-67. Springer, (1992)Replay debugging of non-deterministic executions in the Kernel-based Virtual Machine., and . Softw. Pract. Exp., 43 (11): 1261-1281 (2013)Gateways for Accessing Fault Tolerance Domains., , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 88-103. Springer, (2000)Protection against Covert Storage and Timing Channels., and . CSFW, page 209-214. IEEE Computer Society, (1991)Total ordering algorithms., , and . ACM Conference on Computer Science, page 375-380. ACM, (1991)Unification of Replication and Transaction Processing in Three-Tier Architectures., , and . ICDCS, page 290-297. IEEE Computer Society, (2002)The Totem Redundant Ring Protocol., , and . ICDCS, page 598-607. IEEE Computer Society, (2002)A Mobile Peer-to-Peer Search and Retrieval Service for Social Networks., , , and . IEEE MS, page 72-79. IEEE Computer Society, (2012)