Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing X-ray computed tomography for heritage conservation: The case of Megalosaurus bucklandii., , , , , , and . I2MTC, page 1-5. IEEE, (2017)Innovative wick design for multi-source, flat plate heat pipes., , , , , and . Microelectronics Journal, 34 (3): 187-194 (2003)Byzantine-Resistant Total Ordering Algorithms., and . Inf. Comput., 150 (1): 75-111 (1999)Resource management using multiple feedback loops in soft real-time distributed object systems., , , and . Journal of Systems and Software, 81 (7): 1144-1162 (2008)Analyzing and Measuring the Latency of the Totem Multicast Protocols., , and . Computer Networks, 31 (1-2): 59-78 (1999)Eternal - a component-based framework for transparent fault-tolerant CORBA., , and . Softw., Pract. Exper., 32 (8): 771-788 (2002)Formal Verification of Safety-critical Systems., and . Softw., Pract. Exper., 20 (8): 799-821 (1990)A Reservation-Based Extended Transaction Protocol., , and . IEEE Trans. Parallel Distrib. Syst., 19 (2): 188-203 (2008)Strongly consistent replication and recovery of fault-tolerant CORBA applications., , and . Comput. Syst. Sci. Eng., 17 (2): 103-114 (2002)From State Machines to Temporal Logic: Specification Methods for Protocol Standards., and . PSTV, page 3-19. North-Holland, (1982)