Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ephemeral Data Storage for Networks of Hand-Held Devices., , , and . Trustcom/BigDataSE/ISPA, page 1106-1113. IEEE, (2016)It's about Thyme: On the design and implementation of a time-aware reactive storage system for pervasive edge computing environments., , , , , and . Future Gener. Comput. Syst., (2021)A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software)., , , , , , , , , and 6 other author(s). CoRR, (2018)Framework Support for the Efficient Implementation of Multi-version Algorithms., , and . Transactional Memory, volume 8913 of Lecture Notes in Computer Science, Springer, (2015)FLeeC: a Fast Lock-Free Application Cache., , and . CoRR, (2024)Pot: Deterministic transactional execution., , , and . CoRR, (2016)Verifying Real-World Software with Contracts for Concurrency.. ISoLA (4), volume 11247 of Lecture Notes in Computer Science, page 70-73. Springer, (2018)Time-aware reactive storage in wireless edge environments., , , , and . MobiQuitous, page 238-247. ACM, (2019)RedMesh: A WiFi-Direct Network Formation Algorithm for Large-Scale Scenarios., , and . MobiQuitous, page 147-157. ACM, (2020)Towards the Opportunistic Combination of Mobile Ad-hoc Networks with Infrastructure Access., , , , and . MECC@Middleware, page 3. ACM, (2016)