Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness Testing Techniques and Tools., , , , , and . Resilience Assessment and Evaluation of Computing Systems, Springer, (2012)Automated Scalability Assessment in DevOps Environments.. ICPE Companion, page 10. ACM, (2020)Automated generation of test cases using a performability model., , , and . IET Softw., 5 (2): 113-119 (2011)The Advantage of Dynamic Tuning in Distributed Asymmetric Systems., , , , and . INFOCOM, page 811-818. IEEE Computer Society, (1990)A Load Sharing Interconnection Network for Hard Real-Time Systems., , and . IPPS, page 591-598. IEEE Computer Society, (1991)An Empirical Approach for the Assessment of Scheduling Risk in a Large Globally Distributed Industrial Software Project., and . ICGSE, page 341-346. IEEE Computer Society, (2009)Coordination Implications of Software Architecture in a Global Software Development Project., , and . WICSA, page 107-116. IEEE Computer Society, (2008)2nd Workshop on Education and Practice ofPerformance Engineering: WEPPE'19 Chairs' Welcome., and . ICPE Companion, page 57-59. ACM, (2019)Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs., , and . WOSP, page 172-180. ACM, (2007)On Benchmarking Intrusion Detection Systems in Virtualized Environments, , , , and . Technical Report SPEC-RG-2013-002 v.1.0, SPEC Research Group - IDS Benchmarking Working Group, Standard Performance Evaluation Corporation (SPEC), 7001 Heritage Village Plaza Suite 225, Gainesville, VA 20155, USA, (June 2013)