Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application steering in a collaborative environment, , and . Supercomputing, 2003 ACM/IEEE Conference, page 61--61. IEEE, (2003)A Software Based Approach for Trusted Agent Execution on Malicious Host., and . CSE (2), page 837-846. IEEE Computer Society, (2009)Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks., and . SECURWARE, page 17-24. IEEE Computer Society, (2010)Visual Supercomputing: Technologies, Applications and Challenges., , , , , , , , , and . Comput. Graph. Forum, 24 (2): 217-245 (2005)Workflows for Heliophysics., , , , , , and . J. Grid Comput., 11 (3): 481-503 (2013)Investigation to Make Best Use of LSF with High Efficiency., , and . IWCC, page 211-220. IEEE Computer Society, (1999)An Experimental Communication Architecture for Monitoring and Control of Sub-grids., and . SMARTGREENS, page 67-72. SciTePress, (2012)Towards Time Limited Secure Agent Execution on Malicious Host: A Concept Paper., and . NPC Workshops, page 155-162. IEEE Computer Society, (2008)Mini-Grids: Effective Test-Beds for GRID Application., , , , and . GRID, volume 1971 of Lecture Notes in Computer Science, page 158-169. Springer, (2000)A Visualization Architecture for Collaborative Analytical and Data Provenance Activities., , , and . IV, page 253-262. IEEE Computer Society, (2013)