Author of the publication

A Protocol for Load Sharing among a Cluster of Heterogeneous Unix Workstations.

, , , , and . CCGRID, page 668-673. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User controllable security and privacy for mobile mashups., , , , and . HotMobile, page 35-40. ACM, (2011)Understanding approaches for web service composition and execution., , , and . Bangalore Compute Conf., page 1. ACM, (2008)AI-Assisted Security Controls Mapping for Clouds Built for Regulated Workloads., , , , , and . CLOUD, page 136-146. IEEE, (2021)Compliance-as-Code for Cybersecurity Automation in Hybrid Cloud., , , , , and . CLOUD, page 427-437. IEEE, (2022)Clock rate versus IPC: the end of the road for conventional microarchitectures., , , and . ISCA, page 248-259. IEEE Computer Society, (2000)An Architecture for Secure Generation and Verification of Electronic Coupons., , , and . USENIX Annual Technical Conference, General Track, page 51-63. USENIX, (2001)Building Applications Using End to End Composition of Web Services., , , , , , , , and . AAAI, page 1672-1673. AAAI Press / The MIT Press, (2005)Usage Metering for Service-Oriented Grid Computing., , and . IJEBR, 2 (1): 78-106 (2006)Co-operative content adaptation framework: satisfying consumer and content creator in resource constrained browsing., , , , , , and . WWW (Companion Volume), page 221-222. International World Wide Web Conferences Steering Committee / ACM, (2013)Synthy: A system for end to end composition of web services., , , , , , and . J. Web Semant., 3 (4): 311-339 (2005)