Author of the publication

The electronic information security aspects of the administration system.

, , and . SACI, page 327-332. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foundations for Simulating IoT Control Mechanisms with a Chemical Analogy., and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 367-376. (2015)Experiments with Binding Schemes in LOGFLOW., and . Euro-Par, volume 1470 of Lecture Notes in Computer Science, page 842-845. Springer, (1998)Alchemy of Services., , and . ERCIM News, 2011 (85): 37 (2011)Cloud Workload Prediction based on Workflow Execution Time Discrepancies., , , and . CoRR, (2018)Multithreaded architecture for multimedia processing., , , , and . Integr. Comput. Aided Eng., 7 (1): 19-37 (2000)A Comparative Analysis of PVM/MPI and Computational Grids., and . PVM/MPI, volume 2131 of Lecture Notes in Computer Science, page 14-15. Springer, (2001)The electronic information security aspects of the administration system., , and . SACI, page 327-332. IEEE, (2016)The Chemical Machine: An Interpreter for the Higher Order Chemical Language., and . Euro-Par Workshops (1), volume 7155 of Lecture Notes in Computer Science, page 181-190. Springer, (2011)Cloud Workload Prediction by Means of Simulations., , and . Conf. Computing Frontiers, page 279-282. ACM, (2017)A Set of Successive Job Allocation Models in Distributed Computing Infrastructures., , , , and . J. Grid Comput., 14 (2): 347-358 (2016)