From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A combination of Petri nets and process network synthesis., и . SMC, стр. 1167-1174. IEEE, (2003)Watchdog processors in parallel systems., , , и . Microprocess. Microprogramming, 39 (2-5): 69-74 (1993)Application of Extreme Value Analysis for Characterizing the Execution Time of Resilience Supporting Mechanisms in Kubernetes., , , , , , и . EDCC Workshops, том 1279 из Communications in Computer and Information Science, стр. 185-199. Springer, (2020)The Impact of Rare Container Restarts on Uninterrupted Kubernetes Operations., , , , и . EDCC Workshops, том 1462 из Communications in Computer and Information Science, стр. 109-119. Springer, (2021)Scheduling of embedded time-triggered systems., , и . EFTS, стр. 8. ACM, (2007)Semi-automated model extraction from observations for dependability analysis., и . ISSRE Workshops, стр. 1-6. IEEE, (2021)IT Design for Resiliency Using Extreme Value Analysis., и . SAFECOMP, том 12852 из Lecture Notes in Computer Science, стр. 51-66. Springer, (2021)VIATRA - Visual Automated Transformations for Formal Verification and Validation of UML Models., , , , , и . ASE, стр. 267-270. IEEE Computer Society, (2002)Using Fault Injection to Assess Blockchain Systems in Presence of Faulty Smart Contracts., , , , , , , и . IEEE Access, (2020)Remarks on the use of Reed-Solomon codes in signature analysis.. Microprocessing and Microprogramming, 32 (1-5): 843-850 (1991)