Author of the publication

Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol.

, , , , and . Real-Time Systems, 22 (3): 251-280 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Proliferation of Passwords in Distributed Systems., and . IFIP Congress (2), volume A-13 of IFIP Transactions, page 525-531. North-Holland, (1992)Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol., , , , and . Real-Time Systems, 22 (3): 251-280 (2002)The nonoptimality of synchronous bandwidth allocation schemes for the timed token protocol., and . IEEE Communications Letters, 4 (3): 101-103 (2000)How and why feedback composition fails secure systems., and . CSFW, page 95-101. IEEE Computer Society, (1996)Using Deducibility in Secure Network Modelling., , , , and . ESORICS, page 117-123. AFCET, (1990)Pricing for Differentiated Internet Services., and . IDMS, volume 1718 of Lecture Notes in Computer Science, page 365-370. Springer, (1999)Finding the minimum available transmission time for the timed token medium access control protocol., , , and . ECRTS, page 185-194. IEEE Computer Society, (1999)Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol., and . RTCSA, page 120-127. IEEE Computer Society, (1999)Composing Secure Systems that have Emergent Properties., and . CSFW, page 117-122. IEEE Computer Society, (1998)The composability of non-interference system security., and . CSFW, page 2-8. IEEE Computer Society, (1995)