Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mission critical networking Guest editorial., , , , , , , and . IEEE J. Sel. Areas Commun., 28 (5): 625-629 (2010)Communicating Finite State Machines with Priority Channnels., and . ICALP, volume 172 of Lecture Notes in Computer Science, page 209-221. Springer, (1984)Keynote Talk: Communication Without Repudiation: The Unanswered Question.. NETYS, volume 8593 of Lecture Notes in Computer Science, page 1-8. Springer, (2014)Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks., , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 431-432. Springer, (2011)The Implication Problem of Computing Policies., , , , and . SSS, volume 9212 of Lecture Notes in Computer Science, page 109-123. Springer, (2015)The Truth System: Can a System of Lying Processes Stabilize?, and . SSS, volume 4838 of Lecture Notes in Computer Science, page 311-324. Springer, (2007)Closure and Convergence: A Formulation of Fault-Tolerant Computing., and . FTCS, page 396-403. IEEE Computer Society, (1992)A line in the sand: a wireless sensor network for target detection, classification, and tracking., , , , , , , , , and 7 other author(s). Comput. Networks, 46 (5): 605-634 (2004)Balanced Peer Lists: Towards a Collusion-Resistant BGP., and . ICCCN, page 1-6. IEEE Computer Society, (2009)A wireless link protocol: design by refinement., and . ICNP, page 192-200. IEEE Computer Society, (1995)