Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments., , and . EDCC, page 118-129. IEEE Computer Society, (2014)Security for the Mythical Air-Dropped Sensor Network., , , and . ISCC, page 41-47. IEEE Computer Society, (2006)Finding fault with fault injection: an empirical exploration of distortion in fault injection experiments., , and . Software Quality Journal, 24 (1): 7-36 (2016)Panel - The Virtual Heterogeneous Supercomputer: Can It Be Built?, , , , , , , and . HPDC, page 30-31. IEEE, (1993)A Methodology to Efficiently Compare Operating System Stability., , , and . HASE, page 93-100. IEEE Computer Society, (2015)Constructing secure mobile agent systems using the agent operating system., , , , and . IJIIDS, 3 (4): 363-381 (2009)Reliability Issues in Distributed Operating Systems., and . SRDS, page 3-11. IEEE Computer Society, (1987)The Evolution of RFID Security., , and . IEEE Pervasive Computing, 5 (1): 62-69 (2006)HSFI: Accurate Fault Injection Scalable to Large Code Bases., and . DSN, page 144-155. IEEE Computer Society, (2016)Using Active Messages to Support Shared Objects., and . ACM SIGOPS European Workshop, page 112-116. ACM, (1994)