Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat as a Service?: Virtualization's Impact on Cloud Security., , , , and . IT Professional, 14 (1): 32-37 (2012)Comparison and retrieval of process models using related cluster pairs., , , and . Computers in Industry, 63 (2): 168-180 (2012)Let the Clouds Compute: Cost-Efficient Workload Distribution in Infrastructure Clouds., , , , and . GECON, volume 7714 of Lecture Notes in Computer Science, page 91-101. Springer, (2012)Maximizing Cloud Provider Profit from Equilibrium Price Auctions., , , , and . IEEE CLOUD, page 83-90. IEEE, (2012)Composition of Cloud Collaborations under Consideration of Non-functional Attributes., , , , and . ICSOC, volume 8831 of Lecture Notes in Computer Science, page 462-469. Springer, (2014)Complex Service Provisioning in Collaborative Cloud Markets., , , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 88-99. Springer, (2011)Much Ado about Security Appeal: Cloud Provider Collaborations and Their Risks., , , , and . ESOCC, volume 7592 of Lecture Notes in Computer Science, page 80-90. Springer, (2012)Detecting VM Live Migration using a Hybrid External Approach., , , and . CLOSER, page 483-488. SciTePress, (2013)A Graphical Evaluation Tool for Semantic Web Service Matchmaking., , , and . ISWC Posters&Demos, volume 658 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Concurrent Negotiations in Cloud-Based Systems., , , , and . GECON, volume 7150 of Lecture Notes in Computer Science, page 17-31. Springer, (2011)