Author of the publication

A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems.

, , , , and . Peer-to-Peer Networking and Applications, 7 (4): 665-675 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Mobile Interface Based Voice Recognition System., , and . FGIT-EL/DTA/UNESST, volume 352 of Communications in Computer and Information Science, page 150-157. Springer, (2012)Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408., , and . SERA, page 25-30. IEEE Computer Society, (2007)Design Opportunity Tree of Capability Improve for Level-up and Software Process Improvement., , and . SERA, page 19-24. IEEE Computer Society, (2007)Design of Lifecycle for Reliability of Open Source Software., and . Software and Network Engineering, volume 413 of Studies in Computational Intelligence, Springer, (2012)Security Intelligence: Web Contents Security System for Semantic Web., , and . KES (2), volume 4252 of Lecture Notes in Computer Science, page 819-828. Springer, (2006)Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO., and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 555-564. Springer, (2006)Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 363-372. Springer, (2005)Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO., and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 1070-1080. Springer, (2006)A Context-Driven Development Methodology for Context-Aware Systems., , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 429-436. Springer, (2011)Design of Reference Model for Improvement of Security Process.. ICHIT (2), volume 206 of Communications in Computer and Information Science, page 383-390. Springer, (2011)