Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single node and end-to-end buffer control in real time., , and . Modelling and Evaluation of ATM Networks, volume 17 of IFIP Conference Proceedings, page 458-473. Chapman & Hall, (1994)Random Injection Control of Multiprogramming in Virtual Memory., and . Performance, page 143-170. North-Holland, (1976)Reducing power consumption in wired networks., and . ISCIS, page 292-297. IEEE, (2009)A Model of Roll-Back Recovery with Multiple Checkpoints.. ICSE, page 251-255. IEEE Computer Society, (1976)Guest Editor's Introduction to the Special Issue on Neural Network Software and Systems.. IEEE Trans. Software Eng., 18 (7): 549-550 (1992)Distributed associative memory and the computation of membership functions.. Inf. Sci., (1991)Adaptive Dispatching of Tasks in the Cloud., and . IEEE Trans. Cloud Computing, 6 (1): 33-45 (2018)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)Energy-Aware Admission Control for Wired Networks., , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 117-125. Springer, (2013)Resilience and security of opportunistic communications for emergency evacuation., and . PM2HW2N@MSWiM, page 115-124. ACM, (2012)