Author of the publication

Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications.

, , , and . SRDS, page 296-303. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Romano, Luigi
add a person with the name Romano, Luigi
 

Other publications of authors with the same name

A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive., , , and . ESOCC Workshops, volume 567 of Communications in Computer and Information Science, page 126-140. Springer, (2015)Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services., , , , and . J. Ambient Intelligence and Humanized Computing, 6 (6): 753-762 (2015)A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture, , , , and . CoRR, (2007)Big Data Analytics for QoS Prediction Through Probabilistic Model Checking., , , and . CoRR, (2014)Exposing vulnerabilities in electric power grids: An experimental approach., , and . IJCIP, 7 (1): 51-60 (2014)High-Performance and Interoperable Security Services for Mobile Environments., , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 1064-1069. Springer, (2005)From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach., , , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 192-202. Springer, (2009)Innovative Healthcare Services for Nomadic Users., , , , , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 994-1002. Springer, (2006)Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems., , , and . SoMeT, volume 532 of Communications in Computer and Information Science, page 378-387. Springer, (2015)Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level., , , , and . EDCC, page 17-24. IEEE Computer Society, (2018)