Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive self-management of teams of autonomous vehicles., , , , and . MPAC, page 1-6. ACM, (2008)Domain Management and Accounting in an International Cellular Network., , , and . Integrated Network Management, volume C-12 of IFIP Transactions, page 193-206. North-Holland, (1993)Adaptive response system for distributed denial-of-service attacks., , and . Integrated Network Management, page 809-814. IEEE, (2009)A Mission Management Framework for Unmanned Autonomous Vehicles., , , , and . MOBILWARE, volume 7 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-235. Springer, (2009)Reconciling role based management and role based access control., and . ACM Workshop on Role-Based Access Control, page 135-141. ACM, (1997)The CONIC Communication System for Distributed Process Control.. Kommunikation in Verteilten Systemen, volume 60 of Informatik-Fachberichte, page 637-657. Springer, (1983)Self-Managed Cells and their Federation., , , , , and . CAiSE Workshops (2), page 97-107. FEUP Edições, Porto, (2005)Constraint-Based Configuration of Proxylets for Programmable Networks., and . IDMS, volume 2158 of Lecture Notes in Computer Science, page 245-256. Springer, (2001)Self-healing for Pervasive Computing Systems., , and . WADS, volume 6420 of Lecture Notes in Computer Science, page 1-25. Springer, (2009)A Case Study in Representing a Model: to Z or not to Z?, and . Z User Workshop, page 254-268. Springer, (1990)