Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Router Redundancy with Enhanced VRRP for Intelligent Message Routing., , and . SCDM, volume 287 of Advances in Intelligent Systems and Computing, page 581-590. Springer, (2014)Adaptive security architectural model for protecting identity federation in service oriented computing., , , and . J. King Saud Univ. Comput. Inf. Sci., 33 (5): 580-592 (2021)Modelling and simulation of underlay aware distributed service discovery., , and . APCC, page 417-421. IEEE, (2011)Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study., , , , , , and . IEEE Access, (2022)A User-Priorities-Based Strategy for Three-Phase Intelligent Recommendation and Negotiating Agents for Cloud Services., , , , , , and . IEEE Access, (2023)CTMF: Context-Aware Trust Management Framework for Internet of Vehicles., , , , , , , and . IEEE Access, (2022)A collaborative portal for integrating resources in grids., , , and . IC3INA, page 313-318. IEEE, (2013)A review on resource availability prediction methods in volunteer grid computing., , , and . ICCSCE, page 478-483. IEEE, (2014)A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices., , and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 571-585. Springer, (2011)Biologically Inspired Execution Framework for Vulnerable Workflow Systems, , , and . CoRR, (2009)