Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance comparison of node-redundant multicast distribution trees in SDN networks., , and . NetSys, page 1-8. IEEE, (2017)Flexible Scheduling of Transactional Memory on Trees., , , , , and . SSS, volume 13751 of Lecture Notes in Computer Science, page 146-163. Springer, (2022)Redundancy in Communication Networks for Smart Grids.. EPFL, Switzerland, (2016)Formal Analysis and Verification of DPSTM v2 Architecture Using CSP., , , , and . COMPSAC, page 872-877. IEEE, (2022)An Approach to Internet-Based Virtual Call Center Implementation., and . ICN (1), volume 2093 of Lecture Notes in Computer Science, page 75-84. Springer, (2001)A Federated Learning Algorithms Development Paradigm., , , , and . ECBS, volume 14390 of Lecture Notes in Computer Science, page 26-41. Springer, (2023)A Formal Software Verification Concept Based on Automated Theorem Proving and Reverse Engineering., , and . ECBS, page 59-66. IEEE Computer Society, (2002)A Profiling Tool for Heterogeneous Multi-core Systems., , and . ECBS-EERC, page 138-141. IEEE Computer Society, (2015)Work, Span, and Parallelism of Transactional Memory Programs., , and . ECBS-EERC, page 59-66. IEEE Computer Society, (2015)The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks., , and . AICT/SAPIR/ELETE, page 78-82. IEEE Computer Society, (2005)