Author of the publication

Accommodating QoS Prediction in an Adaptive Resource Management Framework.

, , , , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 792-799. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Tzu-Ying Chen University of Stuttgart

Replication Data for: Structural development of a novel punctually supported timber building system for multi-storey construction : Experimental Data: Tension Tests of the Edge Connection, , , , , and . Dataset, (2024)Related to: Anna Krtschil, Luis Orozco, Simon Bechert, Hans Jakob Wagner, Felix Amtsberg, Tzu-Ying Chen, Anand Shah, Achim Menges, Jan Knippers, "Structural development of a novel punctually supported timber building system for multi-storey construction", Journal of Building Engineering, Volume 58, 2022, pages 104972. doi: 10.1016/j.jobe.2022.104972.
 

Other publications of authors with the same name

Network Load Monitoring in Distributed Systems., , , , , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 800-807. Springer, (2000)A worldwide, web-based study of the attitudes of college freshmen toward computing., and . ITiCSE, page 29-32. ACM, (2000)Accommodating QoS Prediction in an Adaptive Resource Management Framework., , , , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 792-799. Springer, (2000)Real-Time Network-Based Anomaly Intrusion Detection., , , , and . Scalable Computing: Practice and Experience, (2001)Monitoring Network QoS in a Dynamic Real-Time System., , , , , and . IPDPS, IEEE Computer Society, (2002)Security for Mission Critical Real-Time Systems., and . Scalable Computing: Practice and Experience, (2001)Identifying a Shared Mental Model Among Incident Responders., , and . IMF, page 15-25. IEEE Computer Society, (2013)DARPA February 1992 ATIS Benchmark Test Results., , , , , and . HLT, Morgan Kaufmann, (1992)Training students to administer and defend computer networks and systems., and . ITiCSE, page 245-249. ACM, (2006)Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection., , and . ACSAC, page 140-149. IEEE Computer Society, (2008)