Author of the publication

Towards a lightweight content-based publish/subscribe services for peer-to-peer systems.

, , and . Int. J. Grid Util. Comput., 1 (3): 239-251 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of Internet of Things Technologies for Clinical Environments., , , and . AINA Workshops, page 1349-1354. IEEE Computer Society, (2013)Bypass: Providing secure DHT routing through bypassing malicious peers., , and . ISCC, page 934-941. IEEE Computer Society, (2008)Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs., , , , and . ISCC, page 595-600. IEEE Computer Society, (2007)Trusted Network Access Control in the Eduroam Federation., , , , and . NSS, page 170-175. IEEE Computer Society, (2009)Approximative fuzzy rules approaches for classification with hybrid-GA techniques., , , and . Inf. Sci., 136 (1-4): 193-214 (2001)An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6)., , and . JoWUA, 1 (2/3): 107-122 (2010)A Framework for Supporting Network Continuity in Vehicular IPv6 Communications., , , , , and . IEEE Intell. Transport. Syst. Mag., 6 (1): 17-34 (2014)Improving interpretability in approximative fuzzy models via multiobjective evolutionary algorithms., , and . Int. J. Intell. Syst., 22 (9): 943-969 (2007)Evaluation of the electromagnetic absorption in furniture for the integration of UHF-RFID tags., , , , and . RFID-TA, page 81-88. IEEE, (2011)On the Application of Clustering Techniques to Support Debugging Large-Scale Multi-Agent Systems., , and . PROMAS, volume 4411 of Lecture Notes in Computer Science, page 217-227. Springer, (2006)