From post

From a Monolith to a Microservices Architecture: An Approach Based on Transactional Contexts.

, , и . ECSA, том 11681 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Video Transcoding Scheme for E-Learning Multimedia Applications., и . ICETE (3), стр. 278-283. INSTICC Press, (2004)Quantitative Analysis of Consensus Algorithms., , , и . IEEE Trans. Dependable Secur. Comput., 9 (2): 236-249 (2012)Spatial priors for perfusion and transit time estimation in PASL-MRI., , и . ISBI, стр. 791-794. IEEE, (2011)An Agile Modeling Oriented Process for Logical Architecture Design., , , , , и . BPMDS/EMMSAD@CAiSE, том 318 из Lecture Notes in Business Information Processing, стр. 260-275. Springer, (2018)ReZone: Disarming TrustZone with TEE Privilege Reduction., , , и . USENIX Security Symposium, стр. 2261-2279. USENIX Association, (2022)Effective Detection of Multimedia Protocol Tunneling using Machine Learning., , и . USENIX Security Symposium, стр. 169-185. USENIX Association, (2018)Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions., , , и . MobiQuitous, стр. 302-311. ACM, (2018)Computer-assisted assessment of cognitive functioning in the elderly through the systemic Lisbon battery., , , , , , , , и . REHAB, стр. 36-39. ACM, (2016)Does the Lean Inception Methodology Contribute to the Software Project Initiation Phase?, , , и . ICCSA (6), том 12254 из Lecture Notes in Computer Science, стр. 741-752. Springer, (2020)Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services., , , и . USENIX Security Symposium, стр. 175-188. USENIX Association, (2012)