Author of the publication

Specifying a Trust Model for Academic Cloud Services.

, , , , and . MobileCloud, page 91-99. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A resource-oriented grid meta-scheduler based on agents., and . Parallel and Distributed Computing and Networks, page 108-113. IASTED/ACTA Press, (2007)Dynamic risk evaluation model as a security field., , , and . GCCE, page 628-629. IEEE, (2015)Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization., , and . GECCO (Companion), page 1201-1204. ACM, (2015)Local dominance and controlling dominance area of solutions in multi and many objectives EAs., , and . GECCO (Companion), page 1811-1814. ACM, (2008)Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization., , and . GECCO, page 753-760. ACM, (2011)Controlling Selection Area of Useful Infeasible Solutions in Directed Mating for Evolutionary Constrained Multiobjective Optimization., , and . LION, volume 8426 of Lecture Notes in Computer Science, page 137-152. Springer, (2014)A complex singular value decomposition algorithm based on the Riemannian Newton method., and . CDC, page 2972-2978. IEEE, (2013)Riemannian conjugate gradient method for complex singular value decomposition problem.. CDC, page 5849-5854. IEEE, (2014)Representation and Analysis of Mobile Computing using TeleLog - A Mobile Logic Language.. CCCT (1), page 217-222. The International Institute of Informatics and Systemics (IIIS), (2004)Synergistic Effect of Adaptive Synapse Arrangement and Column-based Decoder in Cortical Learning Algorithm., , and . SCIS/ISIS, page 1-6. IEEE, (2022)