From post

Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events.

, , , и . ICNP, стр. 191-200. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Soft Constraint Privacy Model based on Identifiability., , и . COMPSAC (2), стр. 675-980. IEEE Computer Society, (2007)978-0-7695-2870-0.MixerSR: A New Feature Extraction Paradigm for Single Image Super-Resolution., , , , , и . ICDIP, стр. 12:1-12:7. ACM, (2023)Element-Wise Layer Normalization for Continuous Signal Representation., , , , , и . ICDIP, стр. 59:1-59:6. ACM, (2023)Cluster-aware arrangement of the parallel coordinate plots., , , и . J. Vis. Lang. Comput., (2018)Traffic and security analysis on Sony Playstation 3., , и . ISI, стр. 272-275. IEEE, (2009)An examination of distributed denial of service attacks., и . EIT, стр. 274-279. IEEE, (2015)Sensitivity embedded homotopy-based backtracking method for chemical process simulation., , , и . ICCA, стр. 1274-1277. IEEE, (2013)Analytic Double Product Integrals for All-Frequency Relighting., , , , , , и . IEEE Trans. Vis. Comput. Graph., 19 (7): 1133-1142 (2013)The Defense Framework for Large-scale Computer Network System., , , и . SEC, том 175 из IFIP Conference Proceedings, стр. 69-78. Kluwer, (2000)Optimizing cost-sensitive trust-negotiation protocols., , , и . INFOCOM, стр. 1431-1442. IEEE, (2005)