Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replay debugging of non-deterministic executions in the Kernel-based Virtual Machine., and . Softw. Pract. Exp., 43 (11): 1261-1281 (2013)Protection against Covert Storage and Timing Channels., and . CSFW, page 209-214. IEEE Computer Society, (1991)Decentralized Mobile Search and Retrieval Using SMS and HTTP to Support Social Change., , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 152-171. Springer, (2011)MAgNET: Mobile Agents for Networked Electronic Trading., , , and . IEEE Trans. Knowl. Data Eng., 11 (4): 509-525 (1999)Gateways for Accessing Fault Tolerance Domains., , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 88-103. Springer, (2000)An Automata-Theoretic Decision Procedure for Future Interval Logic., , , , and . FSTTCS, volume 652 of Lecture Notes in Computer Science, page 51-67. Springer, (1992)Total ordering algorithms., , and . ACM Conference on Computer Science, page 375-380. ACM, (1991)Progress in Real-Time Fault Tolerance., and . SRDS, page 109-111. IEEE Computer Society, (2004)Analysis of the match probabilities for the iTrust information network with message forwarding., and . ICOIN, page 340-345. IEEE Computer Society, (2014)Dynamic Scheduling of Distributed Method Invocations., , and . RTSS, page 57-66. IEEE Computer Society, (2000)