Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerant execution of large parameter sweep applications across multiple VOs with storage constraints., , , , and . Concurrency and Computation: Practice and Experience, 21 (3): 377-392 (2009)Solving Optimization Problems in Nimrod/OK using a Genetic Algorithm., , and . ICCS, volume 9 of Procedia Computer Science, page 1647-1656. Elsevier, (2012)A Virtual Connectivity Layer for Grids., , and . eScience, page 307-312. IEEE Computer Society, (2009)A Defense Security Approach for Infrastructures against Hacking., , and . TrustCom/ISPA/IUCC, page 1600-1606. IEEE Computer Society, (2013)Executing Large Parameter Sweep Applications on a Multi-VO Testbed., , , , and . CCGRID, page 73-82. IEEE Computer Society, (2007)An evolving trust paradigm for enforcing computing system security., , , and . CEC, page 2595-2602. IEEE, (2015)Bridging organizational network boundaries on the grid., , and . GRID, page 327-332. IEEE Computer Society, (2005)Firewall Traversal in the Grid Architecture., , and . HPCC, page 189-196. IEEE, (2010)An Explicit Trust Model Towards Better System Security., , , and . CoRR, (2014)Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment., , and . e-Science, page 21. IEEE Computer Society, (2006)