Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating large-scale feature matching using the Intel® Xeon Phi™ coprocessor., , , , and . IVCNZ, page 148-153. IEEE, (2013)Linking Policies to the Spatial Environment., , and . POLICY, page 73-76. IEEE Computer Society, (2010)Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper)., , , , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 293-312. Springer, (2010)Toward Unified and Flexible Security Policies Enforceable within the Cloud., and . DAIS, volume 7891 of Lecture Notes in Computer Science, page 181-186. Springer, (2013)Structured storage of legal precedents using a minimal deontic ontology, for computer assisted legal document querying., , and . IJMSO, 4 (3): 196-211 (2009)On Logic and Standards for Structuring Documents., , and . WEB, volume 22 of Lecture Notes in Business Information Processing, page 172-186. Springer, (2008)Helping secure robots in WSN environments by monitoring WSN software updates for intrusions., , and . ICARA, page 223-229. IEEE, (2015)Policy Contexts: Controlling Information Flow in Parameterised RBAC., , and . POLICY, page 99-110. IEEE Computer Society, (2003)Manila: Using a Densely Populated PMC-Space for Power Modelling within Large-Scale Systems., , and . ICPP Workshops, page 210-219. IEEE Computer Society, (2016)Performance Tuning on Multicore Systems for Feature Matching within Image Collections., , , , , and . ICPP, page 718-727. IEEE Computer Society, (2013)