Author of the publication

Cyber-Physical Systems as an Enabler for Next Generation Applications.

, and . NBiS, page 417-422. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technique for privacy preserving real-time vehicle tracking using 802.11p technology.. MoMM, page 206-209. ACM, (2011)Event Handling for Distributed Real-Time Cyber-Physical Systems., , , and . ISORC, page 23-30. IEEE Computer Society, (2012)A User-Based Early Warning Service Management Framework in Cloud Computing., , , , , and . Comput. J., 58 (3): 472-496 (2015)ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys., , , , , , and . 3PGCIC, page 465-470. IEEE Computer Society, (2010)Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective., , and . MoMM, page 263-266. ACM, (2012)VoIP: making secure calls and maintaining high call quality., , , , and . MoMM, page 56-62. ACM, (2010)A framework for patient practitioner information exchange., , and . CBMS, page 408-414. IEEE Computer Society, (2010)Watermarking technique for wireless multimedia sensor networks: a state of the art., , and . CUBE, page 832-840. ACM, (2012)Is There Self-Similarity in Cloud QoS Data?, , , and . ICEBE, page 76-81. IEEE Computer Society, (2013)Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance., , , , , and . NBiS, page 597-602. IEEE Computer Society, (2009)