Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intercept driven approach for monitoring of grid applications., , and . HPCS, page 638-642. IEEE, (2010)An Enterprise IT Security Data Model., , and . ICEIS, page 885-891. (2002)Building a Semantic Description for a Data Modelling Language.. Comput. J., 39 (4): 275-290 (1996)Developing a Reflective Framework for Resource and Process Monitoring within Grid Environments., , and . GCA, page 171-174. CSREA Press, (2007)QoS Requirements for a Medical Application on the Grid., , , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 316-330. Springer, (2007)An abstract knowledge based approach to diagnosis and recovery of plan failure in multi-agent systems., , , and . Advanced Engineering Informatics, 21 (2): 183-190 (2007)An assessment of the IDEF notations as descriptive tools., , and . Inf. Syst., 14 (1): 13-28 (1989)Implementation of Enhanced Reflective Meta Object to Address Issues Related to Contractual Resource Sharing within Ad-hoc Grid Environments., , and . GCA, page 231-234. CSREA Press, (2008)A Security Incident Data Model., , and . SEC, volume 214 of IFIP Conference Proceedings, page 481-494. Kluwer, (2002)Grid service QoS in medical environments., , , and . CSCWD, page 548-552. IEEE, (2008)