Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid., , and . Inf. Syst., (2015)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distrib. Comput., 65 (7): 832-842 (2005)Guest Editors' Introduction: Special Section on Semantic Issues of Multimedia Systems., and . IEEE Trans. Knowl. Data Eng., 13 (3): 335-336 (2001)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Computing and Communications, 2 (1): 3-14 (2006)Special Issue: Distributed Objects and Applications '99., and . Concurrency and Computation: Practice and Experience, 13 (7): 503-505 (2001)Toward the Right Communication Protocol for Web Services., , , and . Int. J. Web Service Res., 2 (2): 19-42 (2005)Performance Analysis of Multi-level Time Sharing Task Assignment Policies on Cluster-Based Systems., , and . CLUSTER, page 265-274. IEEE Computer Society, (2010)Network Traffic Analysis and SCADA Security., , , , and . Handbook of Information and Communication Security, Springer, (2010)Efficient SOAP Binding for Mobile Web Services., , and . LCN, page 218-225. IEEE Computer Society, (2005)Mobility-Aware Cache Replacement for Users of Location-Dependent Services., , and . LCN, page 50-58. IEEE Computer Society, (2004)