Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-based Grooming in Optical Networks., , , and . LANOMS, page 125-136. UFRGS, (2005)Remote attestation of confidential VMs using ephemeral vTPMs., , , , , , , , , and . ACSAC, page 732-743. ACM, (2023)Remote attestation of SEV-SNP confidential VMs using e-vTPMs., , , , , , , , , and . CoRR, (2023)The Effect of Symmetric Permutations on the Convergence of a Restarted GMRES Solver with ILU-Type Preconditioners., , and . WSC, page 3219-3230. IEEE, (2019)Policy-Based Grooming in Optical Networks., , , and . J. Netw. Syst. Manag., 16 (4): 325-349 (2008)Metaheuristic algorithms for the bandwidth reduction of large-scale matrices., and . J. Comb. Optim., 43 (4): 727-784 (2022)Applying PBL in Teaching Programming: an Experience Report., , , , , , , and . FIE, page 1-8. IEEE, (2018)Policy-Based Fault Management for Integrating IP over Optical Networks., , , and . IPOM, volume 3751 of Lecture Notes in Computer Science, page 88-97. Springer, (2005)Resistance to information security due to users' information safety behaviors: Empirical research on the emerging markets., , and . Comput. Hum. Behav., (August 2023)A theoretical inquiry into the role of enaction in cybertherapy.. TEEM, page 45-51. ACM, (2015)