Author of the publication

Lock Contention Performance Classification for Java Intrinsic Locks.

, , , , , and . RV, volume 13498 of Lecture Notes in Computer Science, page 274-282. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inside out - A study of users' perceptions of password memorability and recall., , , , , and . J. Inf. Secur. Appl., (2019)A Microservice-Based Architecture for Performance and Energy Benchmarking of Docker-Host Linux Distributions on Internet-of-Things Devices., , and . ICIT, page 705-711. IEEE, (2021)Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks., , and . EUSPN/ICTH, volume 21 of Procedia Computer Science, page 416-423. Elsevier, (2013)What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability., , , , , and . PST, page 127-136. IEEE Computer Society, (2017)Performance Measurement of XML Compression Algorithms for DSRC Messages., , and . LCN, page 677-684. IEEE Computer Society, (2007)A frame handler module for a side-channel in mobile ad hoc networks., , , , , and . LCN, page 930-936. IEEE Computer Society, (2009)Using a Blackboard to Integrate Multiple Activities and Achieve Strategic Reasoning for Mobile-Robot Navigation., , , , and . IEEE Expert, 10 (2): 24-36 (1995)Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments., and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 24-40. (2017)An analysis of the Collection Tree Protocol (CTP) in mobile sensing environments., , and . PIMRC, page 1-7. IEEE, (2017)A Comparison of Real-Time Obstacle Avoidance Methods for Mobile Robots., , and . ISER, volume 190 of Lecture Notes in Control and Information Sciences, page 301-316. Springer, (1991)