Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Churn Resilience of Peer-to-Peer Group Membership: A Performance Analysis., , , and . IWDC, volume 3741 of Lecture Notes in Computer Science, page 226-237. Springer, (2005)Assigning time budgets to component functions in the design of time-critical automotive systems., , , , , and . ASE, page 235-246. ACM, (2014)Investigating the Existence and the Regularity of Logarithmic Harary Graphs., , , and . SRDS, page 237-246. IEEE Computer Society, (2008)Rationals vs Byzantines in Consensus-based Blockchains., , , and . CoRR, (2019)Scalable lightning factories for Bitcoin., , and . SAC, page 302-309. ACM, (2019)A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications., , , , and . TrustCom, page 1176-1187. IEEE Computer Society, (2011)EAST-ADL: An Architecture Description Language for Automotive Software-intensive Systems in the Light of Recent use and Research., , , , , , , and . IJSDA, 5 (3): 1-20 (2016)Communication Channel Management for Maintenance of Strong Overlay Connectivity., , and . ISCC, page 63-68. IEEE Computer Society, (2006)Asynchronous Active Replication in Three-Tier Distributed Systems., , and . PRDC, page 19-28. IEEE Computer Society, (2002)A theoretical evaluation of peer-to-peer internal clock synchronization., , , and . Autonomics, page 1. ICST, (2008)