Author of the publication

DAML-Based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems.

, , , , , , , , , , , and . CEEMAS, volume 2691 of Lecture Notes in Computer Science, page 122-135. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Suri, Niranjan
add a person with the name Suri, Niranjan
 

Other publications of authors with the same name

PIM: A Novel Architecture for Coordinating Behavior of Distributed Systems., , , , and . AI Magazine, 31 (2): 9-24 (2010)State Capture and Resource Control for Java: The Design and Implementation of the Aroma Virtual Machine.. Java Virtual Machine Research and Technology Symposium, USENIX, (2001)Information-Centric Networking in next-generation communications scenarios., , , and . J. Network and Computer Applications, (2017)Infrastructure, middleware, and applications for portable cellular devices in tactical edge networks., , , , , , , and . MILCOM, page 1541-1546. IEEE, (2011)Interconnecting Tactical Service-Oriented Infrastructures with Federation Services., , , , , , and . MILCOM, page 692-697. IEEE, (2013)Supporting COTS applications in Tactical Edge Networks., , , , and . MILCOM, page 1-7. IEEE, (2012)KARMEN: Multi-agent Monitoring and Notification for Complex Processes., , , , and . HoloMAS, volume 3593 of Lecture Notes in Computer Science, page 197-206. Springer, (2005)Editorial message: special track on agents, interactions, mobility, and systems (AIMS)., , and . SAC, page 37. ACM, (2004)Software agents for process monitoring and notification., , , , , , , , and . SAC, page 94-100. ACM, (2004)Using mobile agents as roaming security guards to test and improve security of hosts and networks., , , , and . SAC, page 87-93. ACM, (2004)