Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Bounds on Hybrid Vector Clocks., , and . OPODIS, volume 46 of LIPIcs, page 34:1-34:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance., and . IEEE Trans. Dependable Secur. Comput., 2 (3): 201-215 (2005)Symbolic synthesis of masking fault-tolerant distributed programs., , and . Distributed Comput., 25 (1): 83-108 (2012)Terminating alternator.. Parallel Process. Lett., 17 (4): 379-390 (2007)Biased Clocks: A Novel Approach to Improve the Ability To Perform Predicate Detection with O(1) Clocks., and . SIROCCO, volume 11085 of Lecture Notes in Computer Science, page 345-360. Springer, (2018)Transformations for Write-All-with-Collision Model., and . OPODIS, volume 3144 of Lecture Notes in Computer Science, page 184-197. Springer, (2003)UFIT: A Tool for Modeling Faults in UPPAAL Timed Automata., , and . NFM, volume 9058 of Lecture Notes in Computer Science, page 429-435. Springer, (2015)Inducing Lattices in Non-Lattice-Linear Problems., and . SRDS, page 232-242. IEEE, (2023)A Family of Collusion Resistant Protocols for Instantiating Security., and . ICNP, page 279-288. IEEE Computer Society, (2005)Constraint Based Automated Synthesis of Nonmasking and Stabilizing Fault-Tolerance., and . SRDS, page 119-128. IEEE Computer Society, (2009)