Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Quality of Monitoring for Network Management., , , , , , , , and . Comput. J., 53 (5): 541-550 (2010)Evolution of storage management: Transforming raw data into information., , , , , , , , , and 14 other author(s). IBM Journal of Research and Development, 52 (4-5): 341-352 (2008)A Scheme for Real-Time Channel Establishment in Wide-Area Networks., and . IEEE Journal on Selected Areas in Communications, 8 (3): 368-379 (1990)The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment., , , , , , , , , and 2 other author(s). POLICY, page 247-249. IEEE Computer Society, (2008)Deployment Time Performance Optimization of Internet Services., , , , and . GLOBECOM, IEEE, (2006)Network prediction in a policy-based IP network., and . GLOBECOM, page 2522-2526. IEEE, (2001)Intelligence, Surveillance, and Reconnaissance fusion for coalition operations., , , and . FUSION, page 1-8. IEEE, (2008)ALMI: An Application Level Multicast Infrastructure., , , and . USITS, page 49-60. USENIX, (2001)The Challenge of Access Control Policies Quality., , , , and . J. Data and Information Quality, 10 (2): 6:1-6:6 (2018)Acoustic Signal Processing for Anomaly Detection in Machine Room Environments: Demo Abstract., , , , , , , and . BuildSys@SenSys, page 213-214. ACM, (2016)