Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software)., , , , , , , , , and 6 other author(s). CoRR, (2018)Framework Support for the Efficient Implementation of Multi-version Algorithms., , and . Transactional Memory, volume 8913 of Lecture Notes in Computer Science, Springer, (2015)It's about Thyme: On the design and implementation of a time-aware reactive storage system for pervasive edge computing environments., , , , , and . Future Gener. Comput. Syst., (2021)Ephemeral Data Storage for Networks of Hand-Held Devices., , , and . Trustcom/BigDataSE/ISPA, page 1106-1113. IEEE, (2016)Towards the Opportunistic Combination of Mobile Ad-hoc Networks with Infrastructure Access., , , , and . MECC@Middleware, page 3. ACM, (2016)Verifying Real-World Software with Contracts for Concurrency.. ISoLA (4), volume 11247 of Lecture Notes in Computer Science, page 70-73. Springer, (2018)RedMesh: A WiFi-Direct Network Formation Algorithm for Large-Scale Scenarios., , and . MobiQuitous, page 147-157. ACM, (2020)Time-aware reactive storage in wireless edge environments., , , , and . MobiQuitous, page 238-247. ACM, (2019)Pot: Deterministic transactional execution., , , and . CoRR, (2016)Time-Aware Publish/Subscribe for Networks of Mobile Devices., , , , and . CoRR, (2018)