Author of the publication

Predictive Modelling of Peer-to-Peer Event-Driven Communication in Component-Based Systems.

, , and . EPEW, volume 6342 of Lecture Notes in Computer Science, page 219-235. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flat wireless ATM LAN architecture with distributed ATM switching in base stations., , , and . Computer Networks, 31 (9-10): 931-942 (1999)How to Write a Better Thesis, , and . Springer, (2014)Effectiveness of Moving Target Defenses., , and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011).NET Security: Lessons Learned and Missed from Java., and . ACSAC, page 272-281. IEEE Computer Society, (2004)Capacity planning for event-based systems using automated performance predictions., , and . ASE, page 352-361. IEEE Computer Society, (2011)Election Security: Perception and Reality., and . IEEE Security & Privacy, 2 (1): 24-31 (2004)Access Controls and Health Care Records: Who Owns the Data?, , and . ACM Queue, 17 (2): 50 (2019)Data Structure Programming System., and . IFIP Congress (1), page 557-564. (1968)Evaluating Differentially Private Machine Learning in Practice., and . USENIX Security Symposium, page 1895-1912. USENIX Association, (2019)Threat Modeling for Services in Cloud., and . SOSE, page 66-72. IEEE Computer Society, (2016)