Author of the publication

A universal method for composing business transaction models using logs.

, , , and . Integrated Network Management, page 17-24. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection: A Bioinformatics Approach., , , and . ACSAC, page 24-33. IEEE Computer Society, (2003)Opportunistic routing and middleware composition for sensor and actuator networks.. Rensselaer Polytechnic Institute, USA, (2007)Toward QoI and Energy-Efficiency in Internet-of-Things Sensory Environments., , , and . IEEE Trans. Emerg. Top. Comput., 2 (4): 473-487 (2014)A Letter Soup for the Quality of Information in Sensor Networks., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.Autonomic 802.11 Wireless LAN Security Auditing., , , and . IEEE Secur. Priv., 2 (3): 56-65 (2004)A Self-selection Technique for Flooding and Routing in Wireless Ad-hoc Networks., , and . J. Netw. Syst. Manag., 14 (3): 359-380 (2006)In-Network Outlier Detection in Wireless Sensor Networks, , , , and . CoRR, (2009)ESCORT: Energy-Efficient Sensor Network Communal Routing Topology Using Signal Quality Metrics., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 438-448. Springer, (2005)Sentire: A Framework for Building Middleware for Sensor and Actuator Networks., , , and . PerCom Workshops, page 396-400. IEEE Computer Society, (2005)A middleware framework for market-based actuator coordination in sensor and actuator networks., , and . ICPS, page 101-110. ACM, (2008)