Author of the publication

The Architecture of a Secure Business-Process-Management System in Service-Oriented Environments.

, and . ECOWS, page 49-56. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From source code to runtime behaviour: Software metrics help to select the computer architecture., , , and . Knowl.-Based Syst., 23 (4): 343-349 (2010)Building a Hybrid Database Application for Structured Documents., , and . Multimedia Tools Appl., 8 (1): 65-90 (1999)Parallel NN-search for large multimedia repositories., , and . State-of-the-Art in Content-Based Image and Video Retrieval, page 319-343. Kluwer, (1999)Individual privacy constraints on time-series data., , and . Inf. Syst., (2015)Free riding-aware forwarding in Content-Addressable Networks., and . VLDB J., 16 (4): 463-482 (2007)Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs., , and . SDM, page 723-734. SIAM / Omnipress, (2011)On Extending the XML Engine with Query-Processing Capabilities.. ADL, page 127-138. IEEE Computer Society, (2000)Reviewing the reviewers: A study of author perception on peer reviews in computer science., , and . CollaborateCom, page 1-8. ICST / IEEE, (2010)Traffic Management Based on Negotiations between Vehicles - A Feasibility Demonstration Using Agents., , and . AMEC/TADA, volume 13 of Lecture Notes in Business Information Processing, page 90-104. Springer, (2007)Self-Organization in Overlay Networks., and . CAiSE Workshops (2), page 139-153. FEUP Edições, Porto, (2005)