Author of the publication

Using a Stochastic Well-Formed Net model for assessing a decentralized approach to configuration management

, , and . Performance Evaluation Journal, 64 (3): 229--246 (March 2007)
DOI: http://dx.doi.org/10.1016/j.peva.2006.04.001

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role Based Access Control Models., , and . Inf. Secur. Tech. Rep., 6 (2): 21-29 (2001)Combating Memory Corruption Attacks On Scada Devices., and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 141-156. Springer, (2008)Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets., , and . PASM, volume 128 of Electronic Notes in Theoretical Computer Science, page 59-77. Elsevier, (2004)What you see is what you have in mind: constructing mental models for formatted text processing, , , , , and . Informatics in schools : local proceedings of the 6th International Conference ISSEP 2013 : selected papers, 6, page 139--147. Universitätsverlag Potsdam, (February 2013)TDA: A Time Driven Engine for Predictable Execution of Realtime Systems., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 519-524. Springer, (1998)Behind the Shoulders of Bebras Teams: Analyzing How They Interact with the Platform to Solve Tasks., , , and . CSEDU (Selected Papers), volume 1220 of Communications in Computer and Information Science, page 191-210. Springer, (2019)Reachability Analysis of Time Basic Petri Nets: A Time Coverage Approach., and . SYNASC, page 110-117. IEEE Computer Society, (2011)Validation of Reverse Engineered Web Application Models., , and . WEC (2), page 125-128. Enformatika, Çanakkale, Turkey, (2005)WebUml: reverse engineering of web applications., , and . SAC, page 1662-1669. ACM, (2004)How Pupils Solve Online Problems: An Analytical View., , , and . CSEDU (2), page 132-139. SciTePress, (2019)