Author of the publication

HRIC: Hybrid Resource Information Service Architecture Based on GMA.

, , , , and . ICEBE, page 541-544. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Community-Based Trust Model for P2P Networks., , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 419-428. Springer, (2005)A Scalable Service Scheme for Secure Group Communication in Grid., , , , and . COMPSAC (1), page 31-38. IEEE Computer Society, (2007)CIPS: Coordinated Intrusion Prevention System., , , , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 89-98. Springer, (2005)Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains., , , , , and . IPDPS, IEEE Computer Society, (2005)Improving Log-Based Fault Diagnosis by Log Classification., , , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 446-458. Springer, (2014)A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System., , , and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 13-24. Springer, (2002)Network-Based Anomaly Detection Using an Elman Network., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 471-480. Springer, (2005)A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 42-51. Springer, (2007)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)A Dynamically Grouped Multi-multicast Stream Scheduling Strategy for Video-on-Demand Systems., , and . International Conference on Computational Science, volume 2658 of Lecture Notes in Computer Science, page 822-831. Springer, (2003)