Author of the publication

Architecting Robustness and Timeliness in a New Generation of Aerospace Systems.

, , and . WADS, volume 6420 of Lecture Notes in Computer Science, page 146-170. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability Discovery with Attack Injection., , , , and . IEEE Trans. Software Eng., 36 (3): 357-370 (2010)Time in Distributed System Models and Algorithms., and . Advances in Distributed Systems, volume 1752 of Lecture Notes in Computer Science, page 1-32. Springer, (1999)The Design of a COTSReal-Time Distributed Security Kernel., , and . EDCC, volume 2485 of Lecture Notes in Computer Science, page 234-252. Springer, (2002)The Timely Computing Base Model and Architecture., and . IEEE Trans. Computers, 51 (8): 916-930 (2002)Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery., , , , and . IEEE Trans. Parallel Distributed Syst., 21 (4): 452-465 (2010)Logically Instantaneous Communication on Top of Distributed Memory Parallel Machines., , and . PaCT, volume 1662 of Lecture Notes in Computer Science, page 258-270. Springer, (1999)SSIV 2015 Keynote II: From Embedded Systems to Autonomous Cooperating Objects.. DSN Workshops, page 124. IEEE Computer Society, (2015)The CRUTIAL Architecture for Critical Information Infrastructures., , , , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 1-27. Springer, (2007)Thou Shalt Not Trust non-Trustworthy Systems.. ICDCS Workshops, IEEE Computer Society, (2006)Randomized Intrusion-Tolerant Asynchronous Services., , , and . DSN, page 568-577. IEEE Computer Society, (2006)