Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Semantics of a Class of High-Level Primitives for Coordinating Concurrent Processes, and . Acta Inf., (1975)Addenda and Corrigenda: Acta Informatica 7: 325 (1977).Application polymorphism for autonomic ubiquitous computing., , and . Multiagent and Grid Systems, 1 (2): 109-129 (2005)Media Streaming Protocol: An Adaptive Protocol for the Delivery of Audio and Video over the Internet., and . ICMCS, Vol. 2, page 903-907. IEEE Computer Society, (1999)0-7695-0253-9.Automated Assessment Of Compliance With Security Best Practices., and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 173-187. Springer, (2008)Self-Optimization of Task Execution in Pervasive Computing Environments., and . ICAC, page 333-334. IEEE Computer Society, (2005)A low-latency scalable locking algorithm for shared memory multiprocessors., , and . SPDP, page 10-17. IEEE Computer Society, (1994)RECIPE: Requirements for an evolutionary computer-based information processing environment., and . ISPW, page 67-74. IEEE Computer Society, (1984)PIC: Partitioned Iterative Convergence for Clusters., , , , and . CLUSTER, page 391-401. IEEE Computer Society, (2012)Techniques for Global Optimization of Message Passing Communication on Unreliable Networks., and . ICDCS, page 246-253. IEEE Computer Society, (1995)Atomic Actions in Concurrent Systems., and . ICDCS, page 184-191. IEEE Computer Society, (1985)