Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive response system for distributed denial-of-service attacks., , and . Integrated Network Management, page 809-814. IEEE, (2009)The CONIC Communication System for Distributed Process Control.. Kommunikation in Verteilten Systemen, volume 60 of Informatik-Fachberichte, page 637-657. Springer, (1983)Reconciling role based management and role based access control., and . ACM Workshop on Role-Based Access Control, page 135-141. ACM, (1997)Domain Management and Accounting in an International Cellular Network., , , and . Integrated Network Management, volume C-12 of IFIP Transactions, page 193-206. North-Holland, (1993)A Mission Management Framework for Unmanned Autonomous Vehicles., , , , and . MOBILWARE, volume 7 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-235. Springer, (2009)Adaptive self-management of teams of autonomous vehicles., , , , and . MPAC, page 1-6. ACM, (2008)Ponder2: A Policy System for Autonomous Pervasive Environments., , , and . ICAS, page 330-335. IEEE Computer Society, (2009)Ponder2 - A Policy Environment for Autonomous Pervasive Systems., , , and . POLICY, page 245-246. IEEE Computer Society, (2008)Self-healing for Pervasive Computing Systems., , and . WADS, volume 6420 of Lecture Notes in Computer Science, page 1-25. Springer, (2009)Role-based security for distributed object systems., , and . WETICE, page 80-85. IEEE Computer Society, (1996)