Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentives Against Hidden Action in QoS Overlays., , , , and . Peer-to-Peer Computing, page 12-21. IEEE Computer Society, (2008)Handling the distribution of information in the TMN., , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 398-411. Chapman & Hall, (1995)Utilitarian Placement of Composite Services., , , and . IEEE Trans. Network and Service Management, 15 (2): 638-649 (2018)The large-scale geography of Internet round trip times., , , , , and . Networking, page 1-9. IEEE Computer Society, (2013)Utility-maximizing server selection., , , and . Networking, page 413-421. IEEE Computer Society, (2016)Iterative Design and Delivery of High Impact, Multiple Platform, Scenario-based Interactive Mobile Learning Activities in the Health Sciences., , and . mLearn, volume 955 of CEUR Workshop Proceedings, page 240-243. CEUR-WS.org, (2012)Towards Serverless NFV for 5G Media Applications., , , , , , , , and . SYSTOR, page 118. ACM, (2018)Ut pictura poesis: drawing into space.. SIGGRAPH Art Gallery, page 353-359. ACM, (2013)Exploring and Understanding Multicore Interference from Observable Factors., , , and . Automotive - Safety & Security, volume P-269 of LNI, page 75-88. Gesellschaft für Informatik, Bonn, (2017)On the analysis of random replacement caches using static probabilistic timing methods for multi-path programs., , , , and . Real-Time Systems, 54 (2): 307-388 (2018)