Author of the publication

Theory of commercial application management system and its implementation - AMPS.

, , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)Office message center - a spoken dialogue system., , , , , , and . INTERSPEECH, page 704-706. ISCA, (2000)Adaptive Management of a Utility Computing., , , , and . CLUSTER, page 1-2. IEEE Computer Society, (2005)Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework., , , , , , and . TrustCom/BigDataSE, page 705-712. IEEE, (2018)Spare Instance: an Adaptive Mechanism for Managing Cluster Applications., , and . CLUSTER, page 1-2. IEEE Computer Society, (2005)Using HPSG to represent multi-modal grammar in multi-modal dialogue., , and . INTERSPEECH, page 735-738. ISCA, (2000)Automated Vulnerability Detection in Embedded Devices., , , , and . IFIP Int. Conf. Digital Forensics, volume 532 of IFIP Advances in Information and Communication Technology, page 313-329. Springer, (2018)A Formal Method for Modeling and Managing Large-Scale Distributed Applications., , , and . IASTED PDCS, page 542-547. IASTED/ACTA Press, (2005)VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS., , , , and . TrustCom/BigDataSE, page 800-807. IEEE, (2018)