Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Unified and Flexible Security Policies Enforceable within the Cloud., and . DAIS, volume 7891 of Lecture Notes in Computer Science, page 181-186. Springer, (2013)Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper)., , , , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 293-312. Springer, (2010)Helping secure robots in WSN environments by monitoring WSN software updates for intrusions., , and . ICARA, page 223-229. IEEE, (2015)On Logic and Standards for Structuring Documents., , and . WEB, volume 22 of Lecture Notes in Business Information Processing, page 172-186. Springer, (2008)Configuring large-scale storage using a middleware with machine learning., , , , and . Concurr. Comput. Pract. Exp., 23 (17): 2063-2077 (2011)Investigating large-scale feature matching using the Intel® Xeon Phi™ coprocessor., , , , and . IVCNZ, page 148-153. IEEE, (2013)Structured storage of legal precedents using a minimal deontic ontology, for computer assisted legal document querying., , and . Int. J. Metadata Semant. Ontologies, 4 (3): 196-211 (2009)Introduction to the Special Issue on Integrating Process-oriented and Event-based Systems., , , and . Inf. Syst., (2019)Virtual ground control for survey-grade terrain modelling from satellite imagery., , , , and . IVCNZ, page 1-6. IEEE, (2021)Reproducibility and Automation of the Appraisal Taxonomy., , , and . COLING, page 3731-3740. International Committee on Computational Linguistics, (2022)