Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently providing secure multimedia conferencing in SEC., , , , and . ICC, page 2479-2483. IEEE, (2002)DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects., and . CSCW, page 153-164. ACM, (1994)A model-driven approach to rapid service introduction., , and . Integrated Network Management, page 659-672. IEEE, (2005)Flexible support for synchronous collaboration with selective window sharing and stateful group communication services.. University of Michigan, USA, (1999)Data Management Issues and Trade-Offs in CSCW Systems., , and . IEEE Trans. Knowl. Data Eng., 11 (1): 213-227 (1999)Modeling cryptographic properties of voice and voice-based entity authentication., , and . Digital Identity Management, page 53-61. ACM, (2007)Mapping Domain Expertise within Teams: Visual Stimulation of Knowledge-Building through Collaboration., , and . IV, page 129-134. IEEE Computer Society, (2005)Tolerating Client and Communication Failures in Distributed Groupware Systems., and . SRDS, page 221-227. IEEE Computer Society, (1998)Efficient Model-Driven Service Brokering using Web Services., , , , , , , , and . ICWS, page 622-. IEEE Computer Society, (2004)Adaptive Resource Management of a Virtual Call Center Using a Peer-to-Peer Approach., , , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 425-437. Kluwer, (2003)