Author of the publication

Software Rejuvenation: Analysis, Module and Applications.

, , , and . FTCS, page 381-390. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Prefetching and Eviction Mechanisms of In-Memory Storage Systems Based on Scheduling for Big Data Processing., , , and . IEEE Trans. Parallel Distributed Syst., 30 (8): 1738-1752 (2019)ONE-IP: Techniques for Hosting a Service on a Cluster of Machines., , , , and . Comput. Networks, 29 (8-13): 1019-1027 (1997)Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network., , and . UbiComp Adjunct, page 265-268. ACM, (2016)A Scalable Port Forwarding for P2P-Based Wi-Fi Applications., , , , and . WASA, volume 4138 of Lecture Notes in Computer Science, page 26-37. Springer, (2006)A cluster-based checkpointing scheme for mobile computing on wide area network., , and . Mobile Networks and Computing, volume 52 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 177-193. DIMACS/AMS, (1999)Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract., , , and . ISSRE Workshops, page 319-320. IEEE, (2020)Prediction of Workpiece Film Thickness via Multi-Region Segmented Model of Painting Process Parameters., , , and . IEEM, page 1022-1026. IEEE, (2023)Computing Threshold Times for k-Resilient Protocols., , and . ICPP (2), page 24-27. CRC Press, (1992)CORBA and DCOM: Side by Side, Step by Step and Layer by Layer, , , , , , and . C++ Report, (January 1998)Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management., , , , , , and . LISA, page 33-46. USENIX, (2004)