Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The importance of a standard securit y archit ecture for SOA-based iot middleware., , , and . IEEE Communications Magazine, 53 (12): 20-26 (2015)Evaluating the DTLS Protocol from CoAP in Fog-to-Fog Communications., , and . SOSE, IEEE, (2019)Full-Virtualization on MIPS-based MPSOCs embedded platforms with real-time support., , and . SBCCI, page 44:1-44:7. ACM, (2014)A hypervisor approach with real-time support to the MIPS M5150 processor., , and . ISQED, page 495-501. IEEE, (2015)Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices., , , , , , and . IEEE Commun. Mag., 57 (2): 67-73 (2019)Co-design of a low-latency centralized controller for silicon photonic multistage MZI-based switches., , , , and . OFC, page 1-3. IEEE, (2017)MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices., , , , , and . WF-IoT, page 1-6. IEEE, (2022)Context-based search engine for industrial IoT: Discovery, search, selection, and usage of devices., , , , , and . ETFA, page 1-8. IEEE, (2015)Automating the enterprise business processes in a supply chain environment through RFID services based on CEP technology., , , and . ETFA, page 1-4. IEEE, (2010)A QoS Scheduler for Real-Time Embedded Systems., , and . ISQED, page 564-567. IEEE Computer Society, (2008)