Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Computing and Communications, 2 (1): 3-14 (2006)Guest Editors' Introduction: Special Section on Semantic Issues of Multimedia Systems., and . IEEE Trans. Knowl. Data Eng., 13 (3): 335-336 (2001)Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid., , and . Inf. Syst., (2015)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distrib. Comput., 65 (7): 832-842 (2005)Special Issue: Distributed Objects and Applications '99., and . Concurrency and Computation: Practice and Experience, 13 (7): 503-505 (2001)Network Traffic Analysis and SCADA Security., , , , and . Handbook of Information and Communication Security, Springer, (2010)Performance Analysis of Multi-level Time Sharing Task Assignment Policies on Cluster-Based Systems., , and . CLUSTER, page 265-274. IEEE Computer Society, (2010)Toward the Right Communication Protocol for Web Services., , , and . Int. J. Web Service Res., 2 (2): 19-42 (2005)Efficient SOAP Binding for Mobile Web Services., , and . LCN, page 218-225. IEEE Computer Society, (2005)Mobility-Aware Cache Replacement for Users of Location-Dependent Services., , and . LCN, page 50-58. IEEE Computer Society, (2004)