Author of the publication

Deploying Mobile and Intelligent Agents in interconnected E-Marketplaces.

, , , , , and . Transactions of the SDPS, 7 (3): 109-123 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Service Agreement and Process Management., , , , , , , , , and 1 other author(s). ICWS, page 927-930. IEEE Computer Society, (2006)Increasing the Migration E.ciency of Java-based Mobile Agents., , , and . IAT, page 508-511. IEEE Computer Society, (2005)Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services., , , and . IEEE CLOUD, page 573-581. IEEE Computer Society, (2011)A Service-oriented Software Architecture for Mobile Agent Toolkits., , , , and . ECBS, page 550-556. IEEE Computer Society, (2004)Pay One, Get Hundreds for Free: Reducing Cloud Costs through Shared Query Execution., , , and . SoCC, page 439-450. ACM, (2018)Attacking the migration bottleneck of mobile agents., , , and . AAMAS, page 1239-1240. ACM, (2005)Engineering Aggregation Operators for Relational In-Memory Database Systems.. Karlsruhe Institute of Technology, Germany, (2016)Design Patterns for Agent-Based Service Composition in theWeb., , and . QSIC, page 425-430. IEEE Computer Society, (2005)Retrieval and Perfect Hashing Using Fingerprinting., , , and . SEA, volume 8504 of Lecture Notes in Computer Science, page 138-149. Springer, (2014)SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies., , , , and . SOCA, page 1-10. IEEE Computer Society, (2009)