Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Content Dissemination with a Rank Function., , , and . CIT, page 468-475. IEEE Computer Society, (2016)The Impact of Service Semantics on the Consistent Recovery in SOA., , , and . ISPA, page 109-116. IEEE Computer Society, (2014)P2P Web Browser Middleware to Enhance Service Oriented Computing - Analysis and Evaluation., , , and . SOCA, page 58-65. IEEE Computer Society, (2017)FAST Failure Detection Service for Large Scale Distributed Systems., , and . PDP, page 229-236. IEEE Computer Society, (2009)Alternative Authentication with Smart Contracts for Online Games., and . LCN, page 415-418. IEEE, (2021)Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee., , and . ICEIS (4), page 118-123. (2006)The External Recovery Problem., , , and . Euro-Par Workshops (1), volume 8805 of Lecture Notes in Computer Science, page 535-546. Springer, (2014)Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems., and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 1166-1174. Springer, (2006)Device Fingerprinting: Analysis of Chosen Fingerprinting Methods., , and . IoTBDS, page 167-177. SciTePress, (2017)Version vector protocols implementing session guarantees., , , and . CCGRID, page 929-936. IEEE Computer Society, (2005)