Author of the publication

The evolution of dependable computing at the University of Illinois.

, , , and . IFIP Congress Topical Sessions, volume 156 of IFIP, page 135-164. Kluwer/Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FOCUS: An Experimental Environment for Fault Sensitivity Analysis., and . IEEE Trans. Computers, 41 (12): 1515-1526 (1992)Measurement and Modeling of Computer System Failures.. IFIP Congress, page 115-116. North-Holland/IFIP, (1989)Towards longitudinal analysis of a population's electronic health records using factor graphs., , , , , and . BDCAT, page 79-86. ACM, (2016)Predicting Longitudinal Cognitive Scores Using Baseline Imaging and Clinical Variables., , , , and . ISBI, page 1326-1330. IEEE, (2020)Personalized password guessing: a new security threat., , , , , and . HotSoS, page 22. ACM, (2014)Editorial: Dependability and Security--Looking Foward to 2006.. IEEE Trans. Dependable Secur. Comput., 3 (1): 1 (2006)Editorial: State of the Journal Address.. IEEE Trans. Dependable Secur. Comput., 2 (1): 1 (2005)SVAuth - A Single-Sign-On Integration Solution with Runtime Verification., , , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)AcMC 2 : Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models., , and . ASPLOS, page 515-528. ACM, (2019)COTS Hardware and Software in High-Availability Systems (Panel)., , , , , and . FTCS, page 120. IEEE Computer Society, (1999)