Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Web service discovery in mobile environments., , and . LCN, page 697-705. IEEE Computer Society, (2011)A Policy-Based Middleware for Web Services SLA Negotiation., , , and . ICWS, page 1043-1050. IEEE Computer Society, (2009)Heuristics for Improving Cryptographic Key Assignment in a Hierarchy., , and . AINA Workshops (1), page 531-536. IEEE Computer Society, (2007)A framework for autonomic workload management in DBMSs., , , , and . it - Information Technology, 56 (1): 22-32 (2014)DaaS: Cloud-based mobile Web service discovery., , and . Pervasive and Mobile Computing, (2014)Introduction to the Prototyping of an Intelligent Supervision System., , and . BASYS, volume 229 of IFIP Conference Proceedings, page 427-436. Kluwer, (2002)IDSaaS: Intrusion Detection System as a Service in Public Clouds., and . CCGRID, page 686-687. IEEE Computer Society, (2012)Executing Data-Intensive Workloads in a Cloud., and . CCGRID, page 758-763. IEEE Computer Society, (2012)A Freely Available Syntactic Lexicon for English., and . CoRR, (1994)Design and Engineering of Adaptive Software Systems., , , , , , , and . Engineering Adaptive Software Systems, Springer, (2019)