Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

World feature detection and mapping using stereovision and inertial sensors., , and . Robotics Auton. Syst., 44 (1): 69-81 (2003)Message passing over windows-based desktop grids., , and . MGC@Middleware, page 15. ACM, (2006)A probabilistic model for quantifying the resilience of networked systems., , and . IBM J. Res. Dev., (2013)Data Summarization Techniques for Big Data - A Survey., , , , , and . Handbook on Data Centers, Springer, (2015)A platform for leveraging next generation sequencing for routine microbiology and public health use., , , , , , , , , and . Health Inf. Sci. Syst., (2015)An Analytical Framework for Evaluating Survivability of SCADA Systems., , and . CIT, page 877-881. IEEE Computer Society, (2010)A Probabilistic Model to Predict the Survivability of SCADA Systems., , and . IEEE Trans. Ind. Informatics, 9 (4): 1975-1985 (2013)Patience-Aware Scheduling for Cloud Services: Freeing Users from the Chains of Boredom., , , , and . ICSOC, volume 8274 of Lecture Notes in Computer Science, page 550-557. Springer, (2013)Building a SCADA Security Testbed., , , , and . NSS, page 357-364. IEEE Computer Society, (2009)On the challenges of balancing privacy and utility of open health data., , , , and . AIIP/Semantic Cities@IJCAI, page 43-47. ACM, (2013)