Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial: The 17th Artificial Intelligence and Cognitive Science Conference (AICS-06)., , and . Artif. Intell. Rev., 26 (1-2): 7-9 (2006)Dynamic Code Management on a Java Multicomputer., , and . PDP, page 97-. IEEE Computer Society, (2001)Trusting Groups in Coalition Formation Using Social Distance., , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 418-428. Springer, (2008)Probabilistic Program Analysis for Parallelizing Compilers., , and . VECPAR, volume 3402 of Lecture Notes in Computer Science, page 610-622. Springer, (2004)Hot spot analysis within the FortPort migration tool for parallel platforms., , , and . Microprocessing and Microprogramming, 37 (1-5): 141-144 (1993)An Iterative Approach to Trustable Systems Management Automation and Fault Handling., , , and . J. Network Syst. Manage., 22 (3): 366-395 (2014)Heterogeneity-Aware Distributed Access Structure., , and . Peer-to-Peer Computing, page 152-153. IEEE Computer Society, (2005)Introducing automated management through iteratively increased automation and indicators., , , and . Integrated Network Management, page 1116-1121. IEEE, (2011)Range queries over skip tree graphs., , and . Computer Communications, 31 (2): 358-374 (2008)Peer-to-Peer Information Access and Retrieval., , , and . Ingénierie des Systèmes d'Information, 10 (1): 101-122 (2005)