Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay-tolerant data sharing in tactical environments., , , and . MILCOM, page 605-610. IEEE, (2017)Comparative Analysis of Ad-Hoc Networks Oriented to Collaborative Activities., , and . ARCS, volume 3894 of Lecture Notes in Computer Science, page 465-479. Springer, (2006)Establishing Trusted Identities in Disconnected Edge Environments., , , and . SEC, page 51-63. IEEE Computer Society, (2016)Augur: a step towards realistic drift detection in production ML systems., , , and . SE4RAI@ICSE, page 37-44. ACM, (2022)Cloudlet-based cyber-foraging for mobile systems in resource-constrained edge environments., , , , and . ICSE Companion, page 412-415. ACM, (2014)Tactical Cloudlets: Moving Cloud Computing to the Edge., , , , and . MILCOM, page 1440-1446. IEEE, (2014)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Authentication and Authorization for IoT Devices in Disadvantaged Environments., , , and . WF-IoT, page 368-373. IEEE, (2019)Cyber-foraging for improving survivability of mobile systems., , , and . MILCOM, page 1421-1426. IEEE, (2015)A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging., , , and . Future Gener. Comput. Syst., (2019)