Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Petri net based approach for performing the initial allocation in hardware/software codesign., , and . SMC, page 505-510. IEEE, (1998)Using Petri nets for data dependency analysis., , and . SMC, page 2998-3003. IEEE, (2000)Sensitivity Analysis in a BRT System., , , , and . SysCon, page 1-8. IEEE, (2019)Screening hardware and volume factors in distributed machine learning algorithms on spark., , and . Computing, 103 (10): 2203-2225 (2021)Stochastic Model for Availability Analysis of Service Function Chains using Rejuvenation and Live Migration., and . ISSRE Workshops, page 211-217. IEEE, (2019)Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial, and General Distributions., , , , , , , and . PRDC, page 50-57. IEEE Computer Society, (2017)Impact of a DDoS attack on computer systems: An approach based on an attack tree model., , , , , and . SysCon, page 1-8. IEEE, (2018)Software Rejuvenation in Computer Systems: An Automatic Forecasting Approach Based on Time Series., , , , and . IPCCC, page 1-8. IEEE, (2018)Development Risk Assessment in Software Projects Using Dependability Models., , , , , and . CSE, page 260-267. IEEE Computer Society, (2013)Evaluation of Encoding and Network Aspects on Video Streaming Performance: A Modeling and Experimental Approach., , , , , and . SMC, page 3883-3888. IEEE, (2018)