Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching Conflicts: Functional Validation of Agents, and . AAAI Workshop of Agent Conflicts, page 14--19. Orlando, Florida, AAAI Press, (July 1999)Enabling Information Confidentiality in Publish/Subscribe Overlay Services., , , , , and . ICC, page 5624-5628. IEEE, (2008)Untangling mixed information to calibrate resource utilization in virtual machines., , , , , and . ICAC, page 151-160. ACM, (2011)Adaptive Sensor Placement and Boundary Estimation for Monitoring Mass Objects., , and . IEEE Trans. Syst. Man Cybern. Part B, 38 (1): 222-232 (2008)Understanding Internet Video sharing site workload: A view from data center design., , , , , and . J. Vis. Commun. Image Represent., 21 (2): 129-138 (2010)Integrating Community and Role Detection in Information Networks., , , , , and . SDM, page 72-80. SIAM, (2016)State space exploration using feedback constraint generation and Monte-Carlo sampling., , , and . ESEC/SIGSOFT FSE, page 321-330. ACM, (2007)Fault Detection in Distributed Systems by Representative Subspace Mapping., , and . ICPR (4), page 912-915. IEEE Computer Society, (2006)Network-aware coordination of virtual machine migrations in enterprise data centers and clouds., , , and . IM, page 888-891. IEEE, (2013)Fault detection and localization in distributed systems using invariant relationships., , , , and . DSN, page 1-8. IEEE Computer Society, (2013)