Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Opportunity Cost Approach for Job Assignment in a Scalable Computing Cluster., , , , and . IEEE Trans. Parallel Distributed Syst., 11 (7): 760-768 (2000)Framework for Authentication and Access Control of Client-Server Group Communication Systems., , and . Networked Group Communication, volume 2233 of Lecture Notes in Computer Science, page 128-140. Springer, (2001)Scaling Secure Group Communication Systems: Beyond Peer-to-Peer., , , and . DISCEX (1), page 226-237. IEEE Computer Society, (2003)Towards a Practical Survivable Intrusion Tolerant Replication System., , , , and . SRDS, page 242-252. IEEE Computer Society, (2014)Customizable Fault Tolerance for Wide-Area Replication., , , and . SRDS, page 65-82. IEEE Computer Society, (2007)A Highly Available Application in the Transis Environment., , and . Hardware and Software Architectures for Fault Tolerance, volume 774 of Lecture Notes in Computer Science, page 125-139. Springer, (1993)Deploying Intrusion-Tolerant SCADA for the Power Grid., , , , , , , and . DSN, page 328-335. IEEE, (2019)The Java Market: Transforming the Internet into a Metacomputer, , and . Technical Report, CNDS-98-2. The Johns Hopkins University, (1998)The insider threat in scalable distributed systems: algorithms, metrics and gaps.. STC, page 49. ACM, (2007)Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid., , , , and . DSN, page 255-266. IEEE Computer Society, (2018)