Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance: Current directions and future challenges for service oriented computing., , , , , , , , , and 3 other author(s). SOSE, page 262-267. IEEE Computer Society, (2011)Adaptive Speculation for Efficient Internetware Application Execution in Clouds., , , , , and . ACM Trans. Internet Techn., 18 (2): 15:1-15:22 (2018)An Intrusion Diagnosis Perspective on Cloud Computing., , and . Guide to e-Science, Springer, (2011)Real-Time Fault-Tolerance in Federated Cloud Environments., , and . ISORC Workshops, page 118-123. IEEE Computer Society, (2012)Cloud Computing Security: Opportunities and Pitfalls., , , and . IJGHPC, 4 (1): 52-66 (2012)Assessing Multi-Version Systems Through Fault Injection., and . WORDS, page 105-112. IEEE Computer Society, (2002)Byzantine fault-tolerance in federated cloud computing., , and . SOSE, page 280-285. IEEE Computer Society, (2011)Risk Assessment and Trust in Services Computing: Applications and Experience., , , , , , , , , and 2 other author(s). IEEE SCC, page 392-399. IEEE Computer Society, (2013)ML-NA: A Machine Learning Based Node Performance Analyzer Utilizing Straggler Statistics., , , , , and . ICPADS, page 73-80. IEEE Computer Society, (2017)A novel intrusion severity analysis approach for Clouds., , and . Future Generation Comp. Syst., 29 (1): 416-428 (2013)