Author of the publication

Integrating Checkpointing with Transaction Processing.

, , , and . FTCS, page 304-308. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issues in the Design of a Reflective Library for Checkpointing C++ Objects., , , , and . SRDS, page 224-233. IEEE Computer Society, (1999)A Federated Learning-Based Precision Prediction Model for External Elastic Membrane and Lumen Boundary Segmentation in Intravascular Ultrasound Images., , , , , , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 375-386. Springer, (2022)A Vision-based Dual-axis Positioning System with YOLOv4 and Improved Genetic Algorithms., , , , , and . IRC, page 127-134. IEEE, (2020)A Multi-Faceted Approach towards Spam-Resistible Mail., , , , and . PRDC, page 208-218. IEEE Computer Society, (2005)Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation., , , , , , , and . IOV, volume 10689 of Lecture Notes in Computer Science, page 201-212. Springer, (2017)An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks., , , and . ISCC, page 209-215. IEEE Computer Society, (1999)Integrating Checkpointing with Transaction Processing., , , and . FTCS, page 304-308. IEEE Computer Society, (1997)Checkpointing and Its Applications., , , , and . FTCS, page 22-31. IEEE Computer Society, (1995)Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom., , , and . ICDCS Workshop on Distributed Real-Time Systems, page B7-B13. (2000)Differential privacy-based data de-identification protection and risk evaluation system., , , , and . ICTC, page 416-421. IEEE, (2017)