Author of the publication

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.

, , and . IEEE Symposium on Security and Privacy, page 175-187. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Management of Dynamic Buffer Caches., and . Perform. Eval., 26 (4): 239-262 (1996)Performance analysis of checkpointing strategies., and . SIGMETRICS, page 129. ACM, (1983)Policy function scheduling.. Perform. Eval., 1 (1): 31-47 (1981)Sibyl: a relational database system with remote-access capabilities., , and . AFIPS National Computer Conference, volume 53 of AFIPS Conference Proceedings, page 537-545. AFIPS Press, (1984)Two-level grammars for data conversions.. Future Generation Comp. Syst., 5 (4): 373-380 (1990)Performance Analysis of Checkpointing Strategies, and . ACM Trans. Comput. Syst., 2 (2): 123-144 (1984)Performance evaluation of nonpreemptive response-ratio schedulers.. AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 473-482. AFIPS Press, (1978)Heterogeneous Data Translations Based on Environment Grammars., and . IEEE Trans. Software Eng., 15 (10): 1236-1251 (1989)An Analytical Treatment of Policy Function Schedulers.. Operations Research, 26 (5): 845-863 (1978)The Performance of Job Classes with Distinct Policy Functions.. J. ACM, 29 (2): 514-526 (1982)