Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , and . SAC, page 184-193. ACM, (2021)Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems., , , and . ICS, page 35:1-35:14. ACM, (2022)Failure Diagnosis for Cluster Systems using Partial Correlations., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1091-1101. IEEE, (2021)Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems., , , , , and . DSN, page 508-521. IEEE, (2023)Challenges in Identifying Network Attacks Using Netflow Data., , , and . NCA, page 1-10. IEEE, (2021)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Secure Allocation for Graph-Based Virtual Machines in Cloud Environments., and . PST, page 1-7. IEEE, (2021)Towards Understanding Checkpointing in Transiently Powered IoT Networks., , and . TrustCom, page 559-568. IEEE, (2023)The impact of decreasing transmit power levels on FlockLab to achieve a sparse network., , and . Bench@CPSIoTWeek, page 7-12. ACM, (2019)Automation of fault-tolerant graceful degradation., , and . Distributed Comput., 32 (1): 1-25 (2019)