Author of the publication

A Hybrid Service-based Orchestration System for Composition of Legacy Services.

, , and . GCC Workshops, page 219-226. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integration Framework for Trustworthy Transactions., and . ATC, volume 4158 of Lecture Notes in Computer Science, page 217-226. Springer, (2006)On Self-aware Delay Time Based Service Request Optimization for Gateway Stability in Autonomic Self-healing Systems., , , and . SEUS, volume 4761 of Lecture Notes in Computer Science, page 348-357. Springer, (2007)An Authenticated Key Exchange Mechanism Using One-Time Shared Key., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 187-194. Springer, (2005)A Dynamically Adjustable Rule Engine for Agile Business Computing Environments., , , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 785-796. Springer, (2007)A potable platform to analyze EEG signal for transimting to mobile device via Wi-Fi., , and . ISCE, page 1-2. IEEE, (2015)Autonomic Self-Healing for MANETs., , , and . IC-AI, page 575-581. CSREA Press, (2009)Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks., , , , , and . PRDC, page 179-186. IEEE Computer Society, (2007)A Rule-Based Analysis Method for Cooperative Business Applications., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 1155-1160. Springer, (2005)A Delay Time-Based Peak Load Control for Stable Performance., , and . ISPA, volume 4330 of Lecture Notes in Computer Science, page 329-340. Springer, (2006)A peak load control-based orchestration system for stable execution of hybrid services., and . Concurrency and Computation: Practice and Experience, 20 (4): 361-376 (2008)