From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pricing for Differentiated Internet Services., и . IDMS, том 1718 из Lecture Notes in Computer Science, стр. 365-370. Springer, (1999)The nonoptimality of synchronous bandwidth allocation schemes for the timed token protocol., и . IEEE Communications Letters, 4 (3): 101-103 (2000)Using Deducibility in Secure Network Modelling., , , , и . ESORICS, стр. 117-123. AFCET, (1990)Reducing the Proliferation of Passwords in Distributed Systems., и . IFIP Congress (2), том A-13 из IFIP Transactions, стр. 525-531. North-Holland, (1992)Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol., , , , и . Real Time Syst., 22 (3): 251-280 (2002)How and why feedback composition fails secure systems., и . CSFW, стр. 95-101. IEEE Computer Society, (1996)Finding the minimum available transmission time for the timed token medium access control protocol., , , и . ECRTS, стр. 185-194. IEEE Computer Society, (1999)Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol., и . RTCSA, стр. 120-127. IEEE Computer Society, (1999)An Architecture for a Trusted Network., , , и . ESORICS, стр. 105-113. AFCET, (1990)Effect of nodes reordering on the schedulability of real-time messages in timed token networks., , и . IEEE Communications Letters, 4 (12): 420-422 (2000)