Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors Influencing ATM Adapter Throughput., , , , and . Multimedia Tools Appl., 2 (3): 253-271 (1996)On the Value of Static Analysis for Fault Detection in Software., , , , , and . IEEE Trans. Software Eng., 32 (4): 240-253 (2006)Discovering Tutorial Dialogue Strategies with Hidden Markov Models., , , , , and . AIED, volume 200 of Frontiers in Artificial Intelligence and Applications, page 141-148. IOS Press, (2009)Towards a Unifying Approach in Understanding Security Problems., and . ISSRE, page 136-145. IEEE Computer Society, (2009)On Reliability Analysis of Open Source Software - FEDORA., and . ISSRE, page 325-326. IEEE Computer Society, (2008)A Lost Cell Recovery Technique Using Convolutional Coding at the ATM Adaptation Layer in B-ISDN/ATM., , and . Data Communication Networks and their Performance, volume C-21 of IFIP Transactions, page 141-159. North-Holland, (1993)A survey of common security vulnerabilities and corresponding countermeasures for SaaS., and . GLOBECOM Workshops, page 59-63. IEEE, (2014)SDDC: A Software Defined Datacenter Experimental Framework., , , , , and . FiCloud, page 189-194. IEEE Computer Society, (2015)Modeling execution time of multi-stage N-version fault-tolerant software., , and . COMPSAC, page 505-511. IEEE, (1990)Message from the steering committee and general chairs., and . NCA, page xiii. IEEE Computer Society, (2016)