Author of the publication

Reporting Events in a Multimedia Content Distribution and Consumption System.

, , and . DMS, page 44-50. Knowledge Systems Institute, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification algorithms for governed use of multimedia content., and . Online Inf. Rev., 31 (1): 38-58 (2007)A cost-efficient QoS-aware analytical model of future software content delivery networks., , , , , , and . Int. J. Netw. Manag., (2021)Media Contract Formalization Using a Standardized Contract Expression Language., , , and . IEEE Multim., 22 (2): 64-74 (2015)Architectures and Technologies for Adapting Secured Content in Governed Multimedia Applications., , , , , , and . IEEE Multim., 18 (4): 48-61 (2011)Transfer-Learning-Based Intrusion Detection Framework in IoT Networks., , , , , , and . Sensors, 22 (15): 5621 (2022)Malicious Website Detection Through Deep Learning Algorithms., , , and . LOD, volume 13163 of Lecture Notes in Computer Science, page 512-526. Springer, (2021)Generation of Standardised Rights Expressions from Contracts: An Ontology Approach?, , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 836-845. Springer, (2005)Trust in Event Reporting Mechanisms for DRM., and . CCNC, page 1058-1062. IEEE, (2007)Protecting RSA Hardware Accelerators against Differential Fault Analysis through Residue Checking., , , and . DFT, page 1-6. IEEE, (2019)Workflow Description of Digital Rights Management Systems., , and . OTM Workshops, volume 3292 of Lecture Notes in Computer Science, page 581-592. Springer, (2004)