Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust evaluation between users of social networks using the quality of service requirements and call log histories., and . Kybernetes, 45 (10): 1505-1523 (2016)Toward Efficient Service Composition Techniques in the Internet of Things., and . IEEE Internet of Things Journal, 5 (5): 3774-3787 (2018)Behavioral modeling and formal verification of a resource discovery approach in Grid computing., and . Expert Syst. Appl., 41 (8): 3831-3849 (2014)Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research., , and . Int. J. Communication Systems, (2018)Query optimization mechanisms in the cloud environments: A systematic study., , , , and . Int. J. Communication Systems, (2019)A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop., , , and . J. Network and Computer Applications, (2019)Erratum to: A comprehensive study of the resource discovery techniques in Peer-to-Peer networks., and . Peer-to-Peer Networking and Applications, 9 (1): 254 (2016)A model for assessing the impact of e-learning systems on employees' satisfaction., and . Computers in Human Behavior, (2015)Knowledge sharing mechanisms and techniques in project teams: Literature review, classification, and current trends., and . Computers in Human Behavior, (2016)Customer relationship management mechanisms: A systematic review of the state of the art literature and recommendations for future research., and . Computers in Human Behavior, (2016)