Author of the publication

Software Architecture-Based Adaptation for Pervasive Systems.

, , , , , , and . ARCS, volume 2299 of Lecture Notes in Computer Science, page 67-82. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capitalizing on Awareness of User Tasks for Guiding Self-Adaptation., , , and . CAiSE Workshops (2), page 83-96. FEUP Edições, Porto, (2005)Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model., and . CSE (3), page 438-443. IEEE Computer Society, (2009)Task-based self-adaptation., , , and . WOSS, page 54-57. ACM, (2004)Towards multi-design of situated service-oriented systems., , and . PESOS, page 57-63. ACM, (2010)Chameleon: A Model of Identification, Authorization and Accountability for Ubicomp., and . UIC, volume 6905 of Lecture Notes in Computer Science, page 326-339. Springer, (2011)General Trust Management - GTM., and . SocialCom/PASSAT, page 857-864. IEEE Computer Society, (2010)Steps toward activity-oriented computing., , , , and . IPDPS, page 1-5. IEEE, (2008)TeC apps for smart spaces: simple, decentralized, resilient, and self-healing., , , and . UbiComp, page 637-638. ACM, (2012)Anticipatory configuration of resource-aware applications., , , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-4 (2005)Authentication, authorisation and auditing for ubiquitous computing: a survey and vision., and . Int. J. Space Based Situated Comput., 1 (1): 59-67 (2011)