Author of the publication

A Security Evaluation Model for Multi-Agents Distributed Systems.

, and . BIS, volume P-85 of LNI, page 468-485. GI, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VectorForce: A Video Game Project., , , and . ITNG, page 12-17. IEEE Computer Society, (2011)The implementation of the hierarchical abstract simulator on the HEP computer.. Winter Simulation Conference, page 428-434. ACM, (1985)Developing the VLSI laboratory for the computer architecture course., and . SIGCSE, page 47-52. ACM, (1996)A Security Evaluation Model for Multi-Agents Distributed Systems., and . BIS, volume P-85 of LNI, page 468-485. GI, (2006)Enhancing software productivity through templating., , and . Information & Software Technology, 34 (9): 593-601 (1992)A Faculty/Staff/Student Team for Collaboration in Developing Mobile Applications in the Software Engineering Course., , , , , and . CSEDU (1), page 260-267. SciTePress, (2014)Spider II: A Component-Based Distributed Computing System., and . ISCA PDCS, page 150-156. ISCA, (2001)Managing the Software Development by Using the Recursive Multi- Threaded (RMT) Tool., , and . TOOLS (30), page 344-353. IEEE Computer Society, (1999)Distributed Simulation of Cellular Discrete Time Models., and . IMACS European Simulation Meeting, page 25-36. Elsevier Science Publishers, (1984)Re-engineering the algorithma project for long-term maintenance., , , and . OOPSLA Companion, page 877-886. ACM, (2008)