Author of the publication

A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems.

, , , , and . RTCSA, page 451-454. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)DIAMOnDS - DIstributed Agents for MObile & Dynamic Services, , , , , , , and . CoRR, (2003)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Quality-aware trajectory planning of cellular connected UAVs., , , , , , and . DroneCom@MOBICOM, page 79-85. ACM, (2020)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1096-1105. Springer, (2005)Grid Access Middleware for Handheld Devices., , , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 1002-1011. Springer, (2005)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , and . ICCCN, page 1-11. IEEE, (2020)Towards a framework to measure security expertise in requirements analysis., , , and . ESPRE, page 13-18. IEEE Computer Society, (2014)TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , and . Sci. Program., (2021)