default search action
John F. Meyer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j16]Jaynarayan H. Lala, Carl E. Landwehr, John F. Meyer:
Autonomous vehicle safety: lessons from aviation. Commun. ACM 63(9): 28-31 (2020)
2010 – 2019
- 2013
- [c22]John F. Meyer:
Model-based evaluation of system resilience. DSN Workshops 2013: 1-7
2000 – 2009
- 2005
- [j15]Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal:
Validation of a survivable Publish-Subscribe System. Int. J. Comput. 4(2): 77-94 (2005) - 2004
- [c21]Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha P. Pal:
Model-Based Validation of an Intrusion-Tolerant Information System. SRDS 2004: 184-194 - 2001
- [j14]John F. Meyer:
Performability of an Algorithm for Connection Admission Control. IEEE Trans. Computers 50(7): 724-733 (2001) - 2000
- [c20]John F. Meyer:
Performability of Algorithms for Connection Admission Control. DSN 2000: 181-190 - [c19]William H. Sanders, John F. Meyer:
Stochastic Activity Networks: Formal Definitions and Concepts. European Educational Forum: School on Formal Methods and Performance Analysis 2000: 315-343
1990 – 1999
- 1997
- [c18]John F. Meyer, Sergio Montagna, Roberto Paglino, A. Puglisi:
Analysis of an ATM Multiplexer with Prioritized Service. Modelling and Evaluation of ATM Networks 1997: 171-188 - 1996
- [b1]Ann T. Tai, John F. Meyer, Algirdas Avizienis:
Software performability - from concepts to applications. The Kluwer international series in engineering and computer science 347, Kluwer 1996, ISBN 978-0-7923-9670-3, pp. I-XI, 1-201 - [c17]Ann T. Tai, John F. Meyer:
Performability Management in Distributed Database Systems: An Adaptive Concurrency Control Protocol. MASCOTS 1996: 212-216 - 1995
- [c16]Sergio Montagna, Roberto Paglino, John F. Meyer:
An integrated approach to evaluating the loss performance of ATM switches. Modelling and Evaluation of ATM Networks 1995: 249-268 - [c15]John F. Meyer, Bev Littlewood, David Wright:
Dependability of modular software in a multiuser operational environment. ISSRE 1995: 170-179 - 1993
- [j13]John F. Meyer, Sergio Montagna, Roberto Paglino:
Dimensioning of an ATM Switch with Shared Buffer and Threshold Priority. Comput. Networks ISDN Syst. 26(1): 95-108 (1993) - 1992
- [j12]John F. Meyer:
Performability: A Retrospective and Some Pointers to the Future. Perform. Evaluation 14(3-4): 139-156 (1992) - [c14]John F. Meyer:
The Role of Modeling and Evaluation in the Design Process. IFIP Congress (1) 1992: 636-644 - 1991
- [j11]William H. Sanders, John F. Meyer:
Reduced Base Model Construction Methods for Stochastic Activity Networks. IEEE J. Sel. Areas Commun. 9(1): 25-36 (1991) - [c13]Bryan Eric Aupperle, John F. Meyer:
State Space Generation for Degradable Multiprocessor Systems. FTCS 1991: 308-317
1980 – 1989
- 1989
- [c12]Bryan Eric Aupperle, John F. Meyer, Lu Wei:
Evaluation of fault-tolerant systems with nonhomogeneous workloads. FTCS 1989: 159-166 - [c11]John F. Meyer, K. H. Muralidhar, William H. Sanders:
Performability of a token bus network under transient fault conditions. FTCS 1989: 175-182 - [c10]John F. Meyer:
Hardware and Software Dependability Evaluation: Future Trends. IFIP Congress 1989: 117 - [c9]William H. Sanders, John F. Meyer:
Reduced Base Model Construction Methods for Stochastic Activity Networks. PNPM 1989: 74-84 - 1988
- [j10]John F. Meyer, Lu Wei:
Influence of Workload on Error Recovery in Random Access Memories. IEEE Trans. Computers 37(4): 500-507 (1988) - [c8]John F. Meyer, Lu Wei:
Analysis of workload influence on dependability. FTCS 1988: 84-89 - [c7]Bryan Eric Aupperle, John F. Meyer:
Fault-tolerant BIBD networks. FTCS 1988: 306-311 - 1987
- [c6]William H. Sanders, John F. Meyer:
Performance Variable Driven Construction Methods for Stochastic Activity Networks. Computer Performance and Reliability 1987: 383-398 - [c5]William H. Sanders, John F. Meyer:
Performability Evaluation of Distributed Systems Using Stochastic Activity Networks. PNPM 1987: 111-125 - 1986
- [c4]William H. Sanders, John F. Meyer:
METASAN: A Performability Evaluation Tool Based on Stochastic Acitivity Networks. FJCC 1986: 807-816 - [c3]John F. Meyer:
Which LAN in the Factory (Panel). IFIP Congress 1986: 923-924 - 1985
- [c2]John F. Meyer, Ali Movaghar, William H. Sanders:
Stochastic Activity Networks: Structure, Behavior, and Application. PNPM 1985: 106-115 - 1984
- [j9]David G. Furchtgott, John F. Meyer:
A Performability Solution Method for Degradable Nonrepairable Systems. IEEE Trans. Computers 33(6): 550-554 (1984) - 1983
- [c1]John F. Meyer:
Performability Modeling of Distributed Real-Time Systems. Computer Performance and Reliability 1983: 361-372 - 1982
- [j8]John F. Meyer:
Closed-Form Solutions of Performability. IEEE Trans. Computers 31(7): 648-657 (1982) - 1980
- [j7]John F. Meyer, David G. Furchtgott, Liang T. Wu:
Performability Evaluation of the SIFT Computer. IEEE Trans. Computers 29(6): 501-509 (1980) - [j6]John F. Meyer:
On Evaluating the Performability of Degradable Computing Systems. IEEE Trans. Computers 29(8): 720-731 (1980)
1970 – 1979
- 1976
- [j5]John F. Meyer:
Computation-Based Reliability Analysis. IEEE Trans. Computers 25(6): 578-584 (1976) - [j4]F. Gail Gray, John F. Meyer:
Algebraic Properties of Functions Affecting Optimum Fault-Tolerant Realizations. IEEE Trans. Computers 25(11): 1078-1088 (1976) - 1975
- [j3]John F. Meyer, Robert J. Sundstrom:
On-Line Diagnosis of Unrestricted Faults. IEEE Trans. Computers 24(5): 468-475 (1975) - 1971
- [j2]John F. Meyer:
Fault Tolerant Sequential Machines. IEEE Trans. Computers 20(10): 1167-1177 (1971) - [j1]F. Gail Gray, John F. Meyer:
Locatability of Faults in Combinational Networks. IEEE Trans. Computers 20(11): 1407-1412 (1971)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint