Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity-Based Scheduling of IT Changes., , and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 73-84. Springer, (2007)Analysis of different protocol description styles in VHDL for high-level synthesis., , , , , and . EURO-DAC, page 490-495. IEEE Computer Society Press, (1996)Learning from past experiences to enhance decision support in IT change management., and . NOMS, page 408-415. IEEE, (2010)Similarity metric for risk assessment in IT change plans., , , , , and . CNSM, page 25-32. IEEE, (2010)A Rule-Based Approach to Prioritization of IT Work Requests Maximizing Net Benefit to the Business., , and . RuleML, volume 4824 of Lecture Notes in Computer Science, page 53-62. Springer, (2007)PPS: a pipeline path-based scheduler., and . ED&TC, page 557-561. IEEE Computer Society, (1995)Formulation and evaluation of scheduling techniques for control flow graphs., and . EURO-DAC, page 386-391. IEEE Computer Society, (1995)Trust path: a distributed model of search paths of trust in a peer-to-peer system., and . Secur. Commun. Networks, 8 (3): 360-367 (2015)LearnIT: Enhanced Search and Visualization of IT Projects., , and . AIMS, volume 6155 of Lecture Notes in Computer Science, page 114-117. Springer, (2010)Modelling Cloud Computing Infrastructure., and . AIMS, volume 6155 of Lecture Notes in Computer Science, page 106-109. Springer, (2010)