Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-Driven Management of Agent Systems., , , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 214-229. Springer, (2001)Socio-technical awareness to support recommendation and efficient delivery of IMS-enabled mobile services., , , and . IEEE Commun. Mag., 50 (6): 82-90 (2012)Enhancing the Scalability of IMS-Based Presence Service for LBS Applications., , and . COMPSAC (1), page 29-36. IEEE Computer Society, (2009)Context-Based Access Control for Ubiquitous Service Provisioning., , and . COMPSAC, page 444-451. IEEE Computer Society, (2004)INSANE: A Unified Middleware for QoS-aware Network Acceleration in Edge Cloud Computing., , , and . Middleware, page 57-70. ACM, (2023)High-Level Directives to Drive the Allocation of Parallel Object-Oriented Applications., , and . HIPS, page 55-63. IEEE Computer Society, (1997)A Geo-distributed Architectural Approach Favouring Smart Tourism Development in the 5G Era., , , , , and . GOODTECHS, page 12-17. ACM, (2020)Security Issues in Mobile Agent Technology., , and . FTDCS, page 3-8. IEEE Computer Society, (1999)Improving OpenStack Networking: Advantages and Performance of Native SDN Integration., , , , , , and . ICC, page 1-6. IEEE, (2018)Context-Based Access Control Management in Ubiquitous Environments., , and . NCA, page 253-260. IEEE Computer Society, (2004)