Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring Average Recovery with Adversarial Scheduler., , and . OPODIS, volume 46 of LIPIcs, page 23:1-23:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)Logarithmic keying., , and . ACM Trans. Auton. Adapt. Syst., 3 (4): 18:1-18:18 (2008)The Complexity of Adding Multitolerance., , and . ACM Trans. Auton. Adapt. Syst., 9 (3): 15:1-15:33 (2014)"Slow is Fast" for wireless sensor networks in the presence of message losses., , , , and . J. Parallel Distributed Comput., (2015)Using Model Checking Techniques For Evaluating the Effectiveness of Evolutionary Computing in Synthesis of Distributed Fault-Tolerant Programs., and . GECCO, page 1119-1126. ACM, (2015)Retroscope: Retrospective Monitoring of Distributed Systems., , , and . IEEE Trans. Parallel Distributed Syst., 30 (11): 2582-2594 (2019)Education: Interactive Distributed Applications and the Computer Science Curriculum., , , , and . IEEE Distributed Systems Online, (2002)Component Based Design of Multitolerant Systems., and . IEEE Trans. Software Eng., 24 (1): 63-78 (1998)Brief Announcement: Verification of Stabilizing Programs with SMT Solvers., and . SSS, volume 7596 of Lecture Notes in Computer Science, page 179-182. Springer, (2012)