Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Architecture for Supporting e-Government Cooperative Processes., , , and . TCGOV, volume 3416 of Lecture Notes in Computer Science, page 181-192. Springer, (2005)Survey on the Usage of Machine Learning Techniques for Malware Analysis., , and . CoRR, (2017)Investigating the Cost of Anonymity on Dynamic Networks., and . CoRR, (2015)A classification of total order specifications and its application to fixed sequencer-based implementations., , and . J. Parallel Distributed Comput., 66 (1): 108-127 (2006)k-Arbiter: A Safe and General Scheme for h-out of-k Mutual Exclusion., , , and . Theor. Comput. Sci., 193 (1-2): 97-112 (1998)Fault-tolerant oblivious assignment with m slots in synchronous systems., , , and . J. Parallel Distributed Comput., 74 (7): 2648-2661 (2014)Dynamic quorums for DHT-based enterprise infrastructures., , , , and . J. Parallel Distributed Comput., 68 (9): 1235-1249 (2008)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distributed Comput., 65 (7): 832-842 (2005)AndroDFA: Android Malware Classification Based on Resource Consumption., , , , , and . Inf., 11 (6): 326 (2020)Three-tier replication for FT-CORBA infrastructures., and . Softw. Pract. Exp., 33 (8): 767-797 (2003)