Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In Vivo Evolution of Policies that Govern a Distributed System., and . POLICY, page 134-141. IEEE Computer Society, (2009)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , and . POLICY, page 102-105. IEEE Computer Society, (2009)Establishing Enterprise Communities., , and . EDOC, page 48-58. IEEE Computer Society, (2001)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)Generalized Access Control of Synchronous Communication., and . Middleware, volume 4290 of Lecture Notes in Computer Science, page 281-300. Springer, (2006)The concept of decentralized and secure electronic marketplace., , , and . Electron. Commer. Res., 8 (1-2): 79-101 (2008)An integrated testbed for Virtual Ad Hoc Networks., , , , , , , , and . TRIDENTCOM, page 1-10. IEEE Computer Society, (2009)A decentralized mechanism for application level monitoring of distributed systems., , and . CollaborateCom, page 1-10. ICST / IEEE, (2009)Stealth migration: Hiding virtual machines on the network., , , , , and . INFOCOM, page 1-9. IEEE, (2017)Developing Law-Governed Systems Using Aspects., , , and . J. Object Technol., 7 (9): 25-46 (2008)