Author of the publication

Ad Hoc Debugging Environment for Grid Applications.

, , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 113-120. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Worm Detection in Large Scale Network by Traffic., , , and . PDCAT, page 270-273. IEEE Computer Society, (2005)Experimental Performance Study of a User Intensive and Large-scale Digital Library Framework., , , and . DIAL, page 332-339. IEEE Computer Society, (2006)Detecting the run time attacks in the cloud with an evidence collection based approach., , , and . CCIS, page 514-518. IEEE, (2014)Detecting tag spam in social tagging systems with collaborative knowledge, , and . Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7, page 427--431. Piscataway, NJ, USA, IEEE Press, (2009)A Model for Estimating the Performance of Synchronous Parallel Network Simulation., , , and . IASTED PDCS, page 548-553. IASTED/ACTA Press, (2005)Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems., , , , , , and . IEEE Access, (2018)Network Performance Measurement Methodologies in PGMS., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 466-473. Springer, (2004)Cocktail Search in Unstructured P2P Networks., , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 286-293. Springer, (2004)DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense., , , and . ICC, page 1048-1052. IEEE, (2012)A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme., , , , and . WAIM, page 558-563. IEEE Computer Society, (2008)