Author of the publication

An Interoperability Points Based Interoperability Approach for SaaS Applications.

, , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 22-35. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay-Aware Application Protocol for Internet of Things., , , , , and . IEEE Netw., 33 (1): 120-127 (2018)Usage of Conductive Polymer Composite as the Object Film of Eddy Current Gap Sensor., , and . IEEE Trans. Instrumentation and Measurement, 62 (12): 3202-3208 (2013)An Interoperability Points Based Interoperability Approach for SaaS Applications., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 22-35. Springer, (2013)VVCS: Verifiable Visual Cryptography Scheme., , , and . CIS, page 974-977. IEEE Computer Society, (2011)Carrying Network Accessing Architecture and Strategy Based on Business Differentiation., , , , and . J. Networks, 8 (7): 1470-1475 (2013)Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks., , , and . IEEE Trans. Parallel Distributed Syst., 26 (5): 1301-1312 (2015)Competition-Based Participant Recruitment for Delay-Sensitive Crowdsourcing Applications in D2D Networks., , , and . IEEE Trans. Mob. Comput., 15 (12): 2987-2999 (2016)Stability and Hopf bifurcation in a model of gene expression with distributed time delays., , and . Appl. Math. Comput., (2014)Optimization of multiple gateway deployment for underwater acoustic sensor networks., , and . Comput. Sci. Inf. Syst., 8 (4): 1073-1095 (2011)Delay-constrained single-copy multi-path data transmission in mobile opportunistic networks., , , and . SECON, page 37-45. IEEE, (2014)