Author of the publication

A Fault-Tolerance Architecture for Kepler-Based Distributed Scientific Workflows.

, , , , and . SSDBM, volume 6187 of Lecture Notes in Computer Science, page 452-460. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal model towards scientific workflow security in a cloud., and . IJCC, 7 (3/4): 226-236 (2018)Towards a Unifying Approach in Understanding Security Problems., and . ISSRE, page 136-145. IEEE Computer Society, (2009)On Reliability Analysis of Open Source Software - FEDORA., and . ISSRE, page 325-326. IEEE Computer Society, (2008)A Lost Cell Recovery Technique Using Convolutional Coding at the ATM Adaptation Layer in B-ISDN/ATM., , and . Data Communication Networks and their Performance, volume C-21 of IFIP Transactions, page 141-159. North-Holland, (1993)A survey of common security vulnerabilities and corresponding countermeasures for SaaS., and . GLOBECOM Workshops, page 59-63. IEEE, (2014)Discovering Tutorial Dialogue Strategies with Hidden Markov Models., , , , , and . AIED, volume 200 of Frontiers in Artificial Intelligence and Applications, page 141-148. IOS Press, (2009)A novel framework for software defined based secure storage systems., , , , , and . Simulation Modelling Practice and Theory, (2017)Developing an Open Source 'Big Data' Cognitive Computing Platform: Big Data (Ubiquity symposium)., and . Ubiquity, 2018 (March): 2:1-2:15 (2018)Experimental Analysis of the SABUL Congestion Control Algorithm., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1433-1439. Springer, (2004)Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models., , , , , , and . Intelligent Tutoring Systems (1), volume 6094 of Lecture Notes in Computer Science, page 55-64. Springer, (2010)