Author of the publication

Securing Web Services Using Semantic Web Technologies.

, , , and . Industrial Applications of Semantic Web, volume 188 of IFIP, page 261-273. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Theoretical and Empirical Analysis of Reward Transformations in Multi-Objective Stochastic Games., , and . AAMAS, page 1625-1627. ACM, (2017)Predicting host CPU utilization in the cloud using evolutionary neural networks., , , , and . Future Gener. Comput. Syst., (2018)Inferring the effective reproductive number from deterministic and semi-deterministic compartmental models using incidence and mobility data., and . PLoS Comput. Biol., (2022)Tag-based cooperation in N-player dilemmas., and . AAMAS, page 1211-1212. IFAAMAS, (2011)Neural network topology and weight optimization through neuro differential evolution., , and . GECCO (Companion), page 213-214. ACM, (2017)Norm Convergence in Populations of Dynamically Interacting Agents., , and . AICS, volume 6206 of Lecture Notes in Computer Science, page 219-230. Springer, (2009)iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach., , , , and . ICEIS (3), page 224-233. (2006)PandemCap: Decision support tool for epidemic management., , , , and . VAHC, page 24-30. IEEE, (2017)Particle swarm optimisation with gradually increasing directed neighbourhoods., , and . GECCO, page 29-36. ACM, (2011)Context-Sensitive Regression Analysis for Distributed Data., , , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 292-299. Springer, (2005)