Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software quality metrics based on interconnectivity., and . Journal of Systems and Software, 2 (2): 121-131 (1981)Memory-Constrained Task Scheduling on a Network of Dual Processors, and . J. ACM, 32 (1): 102-129 (January 1985)Task Scheduling with Critical Section Constraints.. IFIP Congress, page 553-557. North-Holland, (1977)Reconciling the Promise and Pragmatics of Enhancing Computing Pedagogy with Data Science., , , and . SIGCSE, page 1029-1034. ACM, (2018)Supporting Secure Ad-hoc User Collaboration in Grid Environments., and . GRID, volume 2536 of Lecture Notes in Computer Science, page 181-193. Springer, (2002)First experiences using XACML for access control in distributed systems., , , , and . XML Security, page 25-37. ACM, (2003)Identifying Critical Factors of Community Privacy., , , , and . SocialCom/PASSAT, page 666-675. IEEE Computer Society, (2012)A Validation of Software Metrics Using Many Metrics and Two Resources., and . ICSE, page 378-385. IEEE Computer Society, (1985)Device-based Isolation for Securing Cryptographic Keys., , , and . ANT/SEIT, volume 19 of Procedia Computer Science, page 1130-1135. Elsevier, (2013)Measuring Object-Oriented Design., , , and . JOOP, 8 (4): 48-55 (1995)