Author of the publication

Achieving End-to-end Predictability in the TAO Real-time CORBA ORB.

, , and . IEEE Real Time Technology and Applications Symposium, page 13-22. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADAPTIVE - An Object-Oriented Framework for Flexible and Adaptive Communication Protocols., , and . HPN, volume C-14 of IFIP Transactions, page 367-382. North-Holland, (1992)Research Advances in Middleware for Distributed Systems., and . Communication Systems: The State of the Art (IFIP World Computer Congress), volume 220 of IFIP Conference Proceedings, page 1-36. Kluwer, (2002)Pattern-orientierte Software-Architektur. dpunkt-Verl., Heidelberg, (2002)Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development., , , and . ICSE, page 288-298. IEEE Computer Society / ACM Press, (1991)Pattern-oriented software architecture. Vol. 5, On patterns and pattern languages, , and . John Wiley, Chichester, England, (2007)Pattern-Oriented Software Architecture, Volume 5: On Patterns and Pattern Languages, , and . Wiley, Chichester, UK, (2007)Coordination of Planning and Scheduling Techniques for a Distributed, Multi-level, Multi-agent System., , , and . ICAART (2), page 184-191. INSTICC Press, (2010)Analyzing Mobile Application Software Power Consumption via Model-driven Engineering., , , and . PECCS, page 101-113. SciTePress, (2011)Techniques for Developing and Measuring High-Performance Web Servers over High Speed Networks, , and . Proceedings of the IEEE INFOCOM '98 Conference on Computer Communications, page 1222-1231. San Francisco, California, IEEE Computer Society Press, (March 1998)Protecting Applications Against Malice Using AdaptiveMiddleware., , , , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 73-108. Kluwer, (2002)