Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying an information gathering architecture to Netfind: a white pages tool for a changing and growing Internet., and . IEEE/ACM Trans. Netw., 2 (5): 426-439 (1994)Thread transparency in information flow middleware., , , , and . Softw., Pract. Exper., 33 (4): 321-349 (2003)A Formal Characterization of Epsilon Serializability., and . IEEE Trans. Knowl. Data Eng., 7 (6): 997-1007 (1995)On-the-Fly, Incremental, Consistent Reading of Entire Databases.. Algorithmica, 1 (3): 271-287 (1986)Editorial for CollaborateCom 2011 Special Issue., , , and . MONET, 18 (2): 235-236 (2013)DsCWeaver: Synchronization-Constraint Aspect Extension to Procedural Process Specification Languages., , , and . Int. J. Web Service Res., 5 (3): 96-117 (2008)Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems., and . Computers & Security, 29 (8): 815-830 (2010)Achieving Efficiency and Portability in Systems Software: A Case Study on POSIX-Compliant Multithreaded Programs., and . IEEE Trans. Software Eng., 31 (9): 785-800 (2005)A Secure Information Flow Architecture for Web Services., , and . IEEE SCC (1), page 182-189. IEEE Computer Society, (2008)An Analysis of Performance Interference Effects in Virtual Environments., , , , , and . ISPASS, page 200-209. IEEE Computer Society, (2007)