Author of the publication

The SAHARA Model for Service Composition across Multiple Providers

, , , , , , , , , , , , , , and . Proceedings of the First International Conference on Pervasive Computing, volume 2414 of Lecture Notes in Computer Science, page 1--14. Zurich, Springer-Verlag, (August 2002)Invited paper.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Machine Learning in the Real World., , , , , and . CoRR, (2020)Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud., , and . CCS, page 1231-1242. ACM, (2022)Research on Fault Diagnosis Technology of Model Support System based on Feature Extraction., , , , , and . ISCID, page 155-158. IEEE, (2022)Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory., , , , and . SEED, page 133-144. IEEE, (2022)ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing., , , and . S&P, page 252-266. IEEE Computer Society, (2007)Lazy Diagnosis of In-Production Concurrency Bugs., , , and . SOSP, page 582-598. ACM, (2017)REPT: Reverse Debugging of Failures in Deployed Software., , , , , , and . OSDI, page 17-32. USENIX Association, (2018)Tracking Rootkit Footprints with a Practical Memory Analysis System., , , and . USENIX Security Symposium, page 601-615. USENIX Association, (2012)Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers., , and . ACSAC, page 361-370. IEEE Computer Society, (2005)Countering kernel rootkits with lightweight hook protection., , , and . ACM Conference on Computer and Communications Security, page 545-554. ACM, (2009)