From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet Security: An Intrusion-Tolerance Approach., и . Proc. IEEE, 94 (2): 432-441 (2006)Saturation: reduced idleness for improved fault-tolerance., , , и . FTCS, стр. 200-205. IEEE Computer Society, (1988)State Restoration in a COTS-Based N-Modular Architecture., , , , и . ISORC, стр. 174-. IEEE Computer Society, (1998)Solaris Service Management Facility: Modern System Startup and Administration., , , , и . LISA, стр. 225-236. USENIX, (2005)Supporting Multiple Levels of Criticality., , , и . FTCS, стр. 70-79. IEEE Computer Society, (1998)Group Communication. Communications of the ACM, (1996)On Stratified Sampling for High Coverage Estimations., , и . EDCC, том 1150 из Lecture Notes in Computer Science, стр. 37-54. Springer, (1996)Fault-tolerance in delta-4., , и . ACM SIGOPS European Workshop, ACM, (1990)Capturing the Behaviour of Volunteer Pedestrians in a Newly-Developed University Campus Using a Distributed Array of Bluetooth Low Energy Devices., , , , , , и . ISC2, стр. 1-7. IEEE, (2023)Tolerance of Design Faults., , , и . Dependable and Historic Computing, том 6875 из Lecture Notes in Computer Science, стр. 428-452. Springer, (2011)