Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SecureRing group communication system., , and . ACM Trans. Inf. Syst. Secur., 4 (4): 371-406 (2001)The Low Latency Fault Tolerance System, , and . CoRR, (2010)Extracting data records from the web using tag path clustering., , , , and . WWW, page 981-990. ACM, (2009)Better Late Than Never., , and . ACM Conference on Computer Science, page 44-51. ACM, (1993)Analysis of Timing Hazards in Ada Programs., and . ACM Conference on Computer Science, page 326-331. ACM, (1993)First-Order Future Interval Logic., , , , and . ICTL, volume 827 of Lecture Notes in Computer Science, page 195-209. Springer, (1994)The Real-Time Graphical Interval Logic Toolset., , , , and . CAV, volume 1102 of Lecture Notes in Computer Science, page 446-449. Springer, (1996)The Totem Multiple-Ring Ordering and Topology Maintenance Protocol., , , and . ACM Trans. Comput. Syst., 16 (2): 93-132 (1998)Mobile Decentralized Search and Retrieval Using SMS and HTTP., , , and . Mob. Networks Appl., 18 (1): 22-41 (2013)Trustworthy Coordination of Web Services Atomic Transactions., , , , and . IEEE Trans. Parallel Distributed Syst., 23 (8): 1551-1565 (2012)