Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sabotage-tolerance and trust management in desktop grid computing., , and . Future Gener. Comput. Syst., 23 (7): 904-912 (2007)SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics., and . Digit. Investig., (2021)A Mobile Virtual Butler to Bridge the Gap between Users and Ambient Assisted Living: A Smart Home Case Study., , , and . Sensors, 14 (8): 14302-14329 (2014)Optimizing GPU Code for CPU Execution Using OpenCL and Vectorization: A Case Study on Image Coding., , , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 537-545. Springer, (2016)libboincexec: A Generic Virtualization Approach for the BOINC Middleware., , and . IPDPS Workshops, page 1903-1908. IEEE, (2011)Post-mortem digital forensic artifacts of TikTok Android App., , , and . ARES, page 42:1-42:8. ACM, (2020)Validating Desktop Grid Results By Comparing Intermediate Checkpoints., , , and . CoreGRID Integration Workshop, page 13-24. Springer, (2006)Using Cliques Of Nodes To Store Desktop Grid Checkpoints., , , and . CoreGRID Integration Workshop, page 25-36. Springer, (2008)Defeating Colluding Nodes in Desktop Grid Computing Platforms., , , , and . J. Grid Comput., 7 (4): 555-573 (2009)Predicting Machine Availabilities in Desktop Pools., , and . NOMS, IEEE, (2006)