Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated synthesis of composite services with correctness guarantee., , , , and . WWW, page 1127-1128. ACM, (2009)KAF: Kalman Filter Based Adaptive Maintenance for Dependability of Composite Services., , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 328-342. Springer, (2008)Discovering User Preference from Folksonomy., , , , and . SMC, page 2114-2119. IEEE, (2013)S-Club: an overlay-based efficient service discovery mechanism in CROWN Grid., , , , and . Knowl. Inf. Syst., 12 (1): 55-75 (2007)QGrid: An Adaptive Trust Aware Resource Management Framework., and . IEEE Syst. J., 3 (1): 78-90 (2009)Balancing Trust and Incentive in Peer-to-Peer Collaborative System., , and . Int. J. Netw. Secur., 5 (1): 73-81 (2007)MultiLanes: providing virtualized storage for OS-level virtualization on many cores., , , , and . FAST, page 317-329. USENIX, (2014)PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations., , and . SRDS, page 199-208. IEEE Computer Society, (2007)S-Club: An Overlay based Efficient Service Discovery Mechanism in CROWN Grid., , , , and . ICEBE, page 441-448. IEEE Computer Society, (2005)Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols., , , , , and . IPDPS, page 1-10. IEEE, (2007)