Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocol Design Rules.. PSTV, page 283-300. North-Holland, (1982)On Conditions for Defining a Closed Cover to Verify Progress for Communicating Finite State Machines., and . IEEE Trans. Software Eng., 15 (11): 1491-1494 (1989)Performance Analysis of IP Switching and Tag Switching., , and . NETWORKING, volume 1815 of Lecture Notes in Computer Science, page 752-762. Springer, (2000)A tool for simulating telecommunications networks and its application in networking courses., and . CATA, page 338-341. ISCA, (1999)Analysis of Routing and Wavelength Assignment in Large WDM Networks., and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 71-78. Elsevier, (2014)Initialization Vector Attacks on the IPsec Protocol Suite., , and . WETICE, page 171-175. IEEE Computer Society, (2000)A performance comparison of zone-based multicast protocols for mobile ad hoc networks., , , , and . ICON, page 543-548. IEEE, (2003)Applications of Sufficient Conditions for Efficient Protocol Test Generation., and . Protocol Test Systems, volume C-11 of IFIP Transactions, page 219-228. North-Holland, (1992)A Robust Distributed Solution to the Generalized Dining Philosophers' Problem., and . ICDE, page 483-489. IEEE Computer Society, (1984)Fault coverage of protocol test methods., and . INFOCOM, page 80-85. IEEE, (1988)