Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consistent Object Replication in the external System., , and . TAPOS, 4 (2): 81-92 (1998)Calculus and Probability Determine the Performance of a Disk Drive.. SIAM Review, 34 (4): 635-641 (1992)Broadcast Protocols for Distributed Systems., , and . IEEE Trans. Parallel Distrib. Syst., 1 (1): 17-25 (1990)Axiomatizations of Interval Logics., , , , and . Fundam. Inform., 24 (4): 313-331 (1995)An automata-theoretic decision procedure for propositional temporal logic with since and until., , , , and . Fundam. Inform., 17 (3): 271-282 (1992)RMR: Reliability Map Routing for Tactical Mobile Ad Hoc Networks., , , , and . IEEE Journal on Selected Areas in Communications, 29 (10): 1935-1947 (2011)A Logic of Knowledge and Belief for Reasoning about Computer Security.. CSFW, page 47-63. IEEE Computer Society, (1989)A Distributed e-Healthcare System Based on the Service Oriented Architecture., , , and . IEEE SCC, page 652-659. IEEE Computer Society, (2007)Live Upgrade Techniques for CORBA Applications., , and . DAIS, volume 198 of IFIP Conference Proceedings, page 257-271. Kluwer, (2001)Solving Consensus in a Byzantine Environment Using an Unreliable Fault Detector., , and . OPODIS, page 61-76. Hermes, (1997)