Author of the publication

A fuzzy service adaptation engine for context-aware mobile computing middleware.

, , , and . Int. J. Pervasive Comput. Commun., 4 (2): 147-165 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Real-Time Memory-Centric Scheduling for Multicore Systems., , , , and . IEEE Trans. Computers, 65 (9): 2739-2751 (2016)A power management strategy of an onboard DC microgrid., , , and . IECON, page 6759-6764. IEEE, (2017)The Research on the Balancing Capacitor Parameter Identification Method for Electric Double-Layer Capacitor Modules., , , and . ICINCO (1), page 485-491. SciTePress, (2013)Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient., , , , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 343-356. Springer, (2003)Feasibility analysis under fixed priority scheduling with limited preemptions., , and . Real Time Syst., 47 (3): 198-223 (2011)A Probabilistic Assessment Method for Voltage Stability Considering Large Scale Correlated Stochastic Variables., , , , , , , , and . IEEE Access, (2020)Limited Preemptive Scheduling for Real-Time Systems. A Survey., , and . IEEE Trans. Ind. Informatics, 9 (1): 3-15 (2013)Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)., , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 56-66. Springer, (2017)Terahertz active imaging radar: preprocessing and experiment results., and . EURASIP J. Wireless Comm. and Networking, (2014)Active Sampling based Safe Identification of Dynamical Systems using Extreme Learning Machines and Barrier Certificates., , and . ICRA, page 22-28. IEEE, (2019)