Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection against Covert Storage and Timing Channels., and . CSFW, page 209-214. IEEE Computer Society, (1991)Decentralized Mobile Search and Retrieval Using SMS and HTTP to Support Social Change., , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 152-171. Springer, (2011)MAgNET: Mobile Agents for Networked Electronic Trading., , , and . IEEE Trans. Knowl. Data Eng., 11 (4): 509-525 (1999)Design and implementation of a consistent time service for fault-tolerant distributed systems., , and . Comput. Syst. Sci. Eng., (2004)Latency analysis of the totem single-ring protocol., , and . IEEE/ACM Trans. Netw., 9 (5): 669-680 (2001)Classic Squares and Broadcast Squares., , and . Discret. Appl. Math., 54 (1): 89-96 (1994)Totem: A Fault-Tolerant Multicast Group Communication System., , , , and . Commun. ACM, 39 (4): 54-63 (1996)Dynamic Pricing for Time-Limited Goods in a Supplier-Driven Electronic Marketplace., , and . Electron. Commer. Res., 5 (2): 267-292 (2005)Replay debugging of non-deterministic executions in the Kernel-based Virtual Machine., and . Softw. Pract. Exp., 43 (11): 1261-1281 (2013)Managing multiple speech-enabled applications in a mobile handheld device., , , , , and . Int. J. Pervasive Comput. Commun., 5 (3): 332-359 (2009)