Author of the publication

Towards Context-Aware Workflow Management for Ubiquitous Computing.

, , , , and . ICESS, page 221-228. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks., , , and . EUSPN/ICTH, volume 21 of Procedia Computer Science, page 183-190. Elsevier, (2013)Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part II., , , and . IEEE Trans. Comput. Social Systems, 2 (4): 124-126 (2015)Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part I., , , and . IEEE Trans. Comput. Social Systems, 2 (3): 38-40 (2015)Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory., , , , and . IEEE Trans. Services Computing, 9 (2): 186-198 (2016)ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks., , , and . IEEE Trans. Information Forensics and Security, 11 (9): 2013-2027 (2016)RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks., , and . IEEE Internet of Things Journal, 3 (4): 511-519 (2016)QoS oriented task scheduling based on generic algorithm in cloud computing., , , and . Comput. Syst. Sci. Eng., (2015)ORACLE: Mobility control in wireless sensor and actor networks., , , , , and . Computer Communications, 35 (9): 1029-1037 (2012)Optimal strategies for defending location inference attack in database-driven CRNs., , , , and . ICC, page 7640-7645. IEEE, (2015)NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security., , , , and . CoRR, (2014)