Author of the publication

Building Autonomic Systems Via Configuration.

, , , , , and . Active Middleware Services, page 77-85. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Narain, Sanjai
add a person with the name Narain, Sanjai
 

Other publications of authors with the same name

Special Feature Mycin: Implementing the Expert System in Loglisp.. IEEE Software, 2 (3): 83-88 (1985)Integration of IP mobility and security for secure wireless communications., , , , , , and . ICC, page 1045-1049. IEEE, (2002)Verification and synthesis of firewalls using SAT and QBF., , , and . ICNP, page 1-6. IEEE Computer Society, (2012)A logic for simulating discontinous systems., and . Winter Simulation Conference, page 692-701. ACM Press, (1989)Declarative Infrastructure Configuration Synthesis and Debugging., , , and . J. Network Syst. Manage., 16 (3): 235-258 (2008)A Technique for Doing Lazy Evaluation in Logic.. SLP, page 261-269. IEEE-CS, (1985)Proofs from Temporal Hypotheses by Symbolic Simulation.. Hybrid Systems, volume 1066 of Lecture Notes in Computer Science, page 327-339. Springer, (1995)Optimization by Non-Deterministic, Lazy Rewriting.. RTA, volume 355 of Lecture Notes in Computer Science, page 326-342. Springer, (1989)Network Configuration Management via Model Finding.. LISA, page 155-168. USENIX, (2005)Large-Scale System Development in Several Lisp Environments., , and . IJCAI, page 859-861. William Kaufmann, (1983)