From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Scheduling for Homogeneous Multiprocessors., , и . IFIP Congress, стр. 286-290. (1974)A Programming Language Extension for Access to a Shared Data Base., , и . ACM Pacific, стр. 114-118. (1975)Security Patterns and A Methodology to Apply them.. Security and Dependability for Ambient Intelligence, том 45 из Advances in Information Security, Springer, (2009)A pattern system of underlying theories for process improvement., и . PLoP, стр. 8:1-8:24. ACM, (2010)The design of secure IoT applications using patterns: State of the art and directions for research., , , и . Internet Things, (2021)A Simplification of a Conversation Design Scheme Using Petri Nets., и . IEEE Trans. Software Eng., 15 (5): 658-660 (1989)An Authorization Model for a Shared Data Base., , и . SIGMOD Conference, стр. 23-31. ACM, (1975)A Security Model for Object-Oriented Databases., , и . S&P, стр. 110-115. IEEE Computer Society, (1989)Patterns for VoIP Signaling Protocol Architectures., и . EuroPLoP, стр. 721-734. UVK - Universitaetsverlag Konstanz, (2007)The Account Analysis Pattern., и . EuroPLoP, стр. 477-484. UVK - Universitaetsverlag Konstanz, (2002)