Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)Blocking time under basic priority inheritance: Polynomial bound and exact computation., , and . CoRR, (2018)A General Methodology for Robotic Haptic Recognition of 3-D Objects., and . ICEIS, page 203-210. (1999)A hybrid system for knowledge-based synthesis of robot grasps., , , and . IROS, page 1575-1581. IEEE, (1993)Confining the Insider Threat in Mass Virtual Hosting Systems., , and . WOSIS, page 105-114. INSTICC Press, (2007)Efficient authentication and verification of certificate status within public-key infrastructures., and . Communications, Internet, and Information Technology, page 182-188. IASTED/ACTA Press, (2004)Precise Worst-Case Blocking Time of Tasks Under Priority Inheritance Protocol., and . IEEE Trans. Computers, 70 (11): 1901-1913 (2021)A flexible scheme for on-line public-key certificate status updating and verification., and . ISCC, page 891-898. IEEE Computer Society, (2002)A neural approach to robotic haptic recognition of 3-D objects based on a Kohonen self-organizing feature map., , , and . IEEE Trans. Ind. Electron., 44 (2): 267-269 (1997)MININET: A Local Area Network for Real-Time Instrumentation Applications., , , , , and . Comput. Networks, (1984)