Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reengineering Legacy Client-Server Systems for New Scalable Secure Web Platforms., , and . Computers and Their Applications, page 297-320. ISCA, (2002)Applying the FAHP to Improve the Performance Evaluation Reliability of Software Defect Classifiers., and . IEEE Access, (2019)Formally expressing HIPAA privacy policies for web services., , and . EIT, page 295-299. IEEE, (2015)JDOP: A Virtual Machine for Java-Based Distributed Object Processing., , and . Computers and Their Applications, page 323-326. ISCA, (2002)Parallel Data Distributions for Optimum LU Decomposition., , and . I. J. Comput. Appl., (2001)Toward a privacy preserving HIPAA-compliant access control model for web services., and . EIT, page 163-167. IEEE, (2014)Parallel Solution of Unstructured Sparse Matrix Equations on a Network of Workstations Using PVM., , and . Applied Informatics, page 457-460. IASTED/ACTA Press, (1999)Optimum data distributions for parallel partitioned LU decomposition., , and . Computers and Their Applications, page 289-293. ISCA, (1999)A Framework for Extracting and Modeling HIPAA Privacy Rules for Healthcare Applications., and . CoRR, (2016)Energy-efficient service-oriented architecture for mobile cloud handover., and . J. Cloud Computing, (2017)