Author of the publication

Countering Agent Security Vulnerabilities using an Extended SENSE Schema.

, , and . IAT, page 183-189. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ECORA framework: A hybrid architecture for context-oriented pervasive computing., , and . Pervasive Mob. Comput., 4 (2): 182-215 (2008)Building ubiquitous computing applications using the VERSAG adaptive agent framework., , , and . J. Syst. Softw., 86 (2): 501-519 (2013)Verification of uncertain context based on a theory of context spaces., , , and . Int. J. Pervasive Comput. Commun., 3 (1): 30-56 (2007)Towards Anytime Anywhere Data Mining e-Services., , and . AusDM, page 47-56. University of Technology Sydney, Australia, (2002)A hybrid model for improving response time in distributed data mining., , and . IEEE Trans. Syst. Man Cybern. Part B, 34 (6): 2466-2479 (2004)A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments., , , and . DAIS, volume 2893 of Lecture Notes in Computer Science, page 212-223. Springer, (2003)Twin-Transactions - Delayed Transaction Synchronisation Model., and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 311-312. Springer, (1998)CAWAnalyser: Enhancing Wireless Intrusion Response with Runtime Context-Awareness., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 239-246. Springer, (2005)Parallel and Distributed Document Overlap Detection on the Web., , and . PARA, volume 1947 of Lecture Notes in Computer Science, page 206-214. Springer, (2000)Techniques for Estimating the Computation and Communication Costs of Distributed Data Mining., , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 603-612. Springer, (2002)