Author of the publication

A specification of a PROWAY protocol with an Algebraic language.

, , and . PSTV, page 195-213. North-Holland, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Users' attachment in trust networks: reputation vs. effort., , , and . IJBIC, 5 (4): 199-209 (2013)Black Hole Metric: Overcoming the PageRank Normalization Problem., , , , and . CoRR, (2018)An Adaptive Scheduler for Multimedia Systems., and . FTDCS, page 324-329. IEEE Computer Society, (1997)Implementing a Distributed Server Using Mobile Agent Technology., , and . ISCC, page 630-634. IEEE Computer Society, (2000)Extracting Logical Schema from the Web., , and . PRICAI Workshop on Text and Web Mining, page 64-71. (2000)Social-Based Arcs Weight Assignment in Trust Networks., , , , and . IDC, volume 616 of Studies in Computational Intelligence, page 143-152. Springer, (2015)Dealing with the Best Attachment Problem via Heuristics., , , , and . IDC, volume 678 of Studies in Computational Intelligence, page 205-214. (2016)Communities Unfolding in Multislice Networks., , , and . CompleNet, volume 116 of Communications in Computer and Information Science, page 187-195. Springer, (2010)An Approach to Trust Based on Social Networks., , , , and . WISE, volume 4831 of Lecture Notes in Computer Science, page 50-61. Springer, (2007)Authentication and Authorization Issues in Mobile Cloud Computing: A Case Study., , , , , and . CLOSER, page 249-256. SciTePress, (2019)