Author of the publication

Development of a service-oriented architecture for the dynamic integration of mobile remote software components.

, , , , and . ETFA, IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VISIONS: A Service Oriented Architecture for Remote Vehicle Inspection., , , and . ITSC, page 163-168. IEEE, (2006)Restructuring the Flow of Image and Video Processing Programs to Increase Instruction Level Parallelism., and . PDP, page 386-. IEEE Computer Society, (2001)Deployment of Service Oriented Architecture for a Business Community., , , and . EDOC, page 293-304. IEEE Computer Society, (2002)Vehicular Sinks Over Wide Area Wireless Sensor Networks for Telemetry Applications in Logistics., and . FiCloud, page 96-101. IEEE, (2019)Extensive GPRS Latency Characterization in Uplink Packet Transmission from Moving Vehicles., , and . VTC Spring, page 2562-2566. IEEE, (2008)Selective Register Renaming: A Compiler-Driven Approach to Dynamic Register Renaming., and . HPCN Europe, volume 2110 of Lecture Notes in Computer Science, page 344-352. Springer, (2001)Cyber-Physical Application for the Safety and Security Enforcement in Oil and Gas Transportation.. IFIPIoT, volume 641 of IFIP Advances in Information and Communication Technology, page 180-196. Springer, (2021)Development of a service-oriented architecture for the dynamic integration of mobile remote software components., , , , and . ETFA, IEEE, (2005)Customizing MPEG Video Compression Algorithms to Specific Application Domains: The Case of Highway Monitoring., , , and . ICIAP (2), volume 1311 of Lecture Notes in Computer Science, page 46-53. Springer, (1997)Application Level Smart Card Support through Networked Mobile Devices., , , and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 172-180. Springer, (2003)