Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Self Adaptable Security Monitoring in IaaS Clouds., , , , and . CCGRID, page 737-740. IEEE Computer Society, (2015)Kerrighed: A Single System Image Cluster Operating System for High Performance Computing., , , , , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 1291-1294. Springer, (2003)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Snooze: A Scalable, Fault-Tolerant and Distributed Consolidation Manager for Large-Scale Clusters., , , , and . GreenCom/CPSCom, page 125-132. IEEE Computer Society, (2010)MetAcsl: Specification and Verification of High-Level Properties., , , , and . CoRR, (2018)Towards Enforcement of the EU GDPR: Enabling Data Erasure., , , and . iThings/GreenCom/CPSCom/SmartData, page 222-229. IEEE, (2018)Vigne: Towards a Self-healing Grid Operating System.. Euro-Par, volume 4128 of Lecture Notes in Computer Science, page 437-447. Springer, (2006)Tame Your Annotations with MetAcsl: Specifying, Testing and Proving High-Level Properties., , , , and . TAP, volume 11823 of Lecture Notes in Computer Science, page 167-185. Springer, (2019)AL-SAFE: A Secure Self-Adaptable Application-Level Firewall for IaaS Clouds., , , and . CloudCom, page 383-390. IEEE Computer Society, (2016)A Case for Single System Image Cluster Operating Systems: The Kerrighed Approach., , , , , and . Parallel Processing Letters, 13 (2): 95-122 (2003)