Author of the publication

Time and Cost Aware Checkpointing of Choreographed Web Services.

, and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 207-219. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time and Cost Aware Checkpointing of Choreographed Web Services., and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 207-219. Springer, (2015)Event Detection and Aspects in Twitter: A BoW Approach., , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 194-211. Springer, (2019)Causal Ordering in Event Notification Service Systems for Mobile Users., , and . ITCC (2), page 735-740. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm., and . ITCC (2), page 730-734. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Interaction patterns based checkpointing of choreographed web services., and . PESOS, page 28-37. ACM, (2014)Automated Scenario Generation Based on UML Activity Diagrams., and . ICIT, page 209-214. IEEE Computer Society, (2008)Active and Nomadic Transactions in Mobile Databases.. ADBIS-DASFAA Symposium, page 99-107. Matfyz Press, Vydavatelstvi, Matematicko-Fyzikalni Fakulty, Unverzity Karlovy, (2000)Trust: Anthropomorphic Algorithmic.. ICDCIT, volume 11969 of Lecture Notes in Computer Science, page 50-72. Springer, (2020)Secured Networking by Sandboxing LINUX 2.6., , , and . SMC, page 3669-3574. IEEE, (2009)Usages of Composition Search Tree in Web Service Composition., and . CoRR, (2015)