Author of the publication

The Design and Performance of a Scalable ORB Architecture for CORBA Asynchronous Messaging.

, , , , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 208-230. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Filtered Cartesian Flattening and Microrebooting to Build Enterprise Applications with Self-adaptive Healing., , , and . Software Engineering for Self-Adaptive Systems, volume 5525 of Lecture Notes in Computer Science, page 241-260. Springer, (2009)Configuring Real-Time Aspects in Component Middleware., , , and . CoopIS/DOA/ODBASE (2), volume 3291 of Lecture Notes in Computer Science, page 1520-1537. Springer, (2004)The Design and Performance of a Pluggable Protocols Framework for Real-Time Distributed Object Computing Middleware., , , , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 372-395. Springer, (2000)Optimizing Mobile Application Performance with Model-Driven Engineering., , , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 36-46. Springer, (2009)Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems.. EMSOFT, volume 2211 of Lecture Notes in Computer Science, page 361-372. Springer, (2001)Model Driven Development for Distributed Real-Time and Embedded Systems.. MoDELS, volume 3713 of Lecture Notes in Computer Science, page 1. Springer, (2005)Coordination of Planning and Scheduling Techniques for a Distributed, Multi-level, Multi-agent System., , , and . ICAART (2), page 184-191. INSTICC Press, (2010)Pattern-Oriented Software Architecture, Volume 5: On Patterns and Pattern Languages, , and . Wiley, Chichester, UK, (2007)Analyzing Mobile Application Software Power Consumption via Model-driven Engineering., , , and . PECCS, page 101-113. SciTePress, (2011)Protecting Applications Against Malice Using AdaptiveMiddleware., , , , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 73-108. Kluwer, (2002)