Author of the publication

Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.

, , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 21-35. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bargaining Compatible Explanations., , and . ICCC, page 98-105. IEEE, (2019)Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing., , , , , and . Image Vis. Comput., 27 (4): 425-436 (2009)Real-time signal processing in embedded systems., , , and . J. Syst. Archit., (2016)Editorial., and . J. Syst. Archit., 55 (4): 209-210 (2009)Spago4Q and the QEST nD Model: An Open Source Solution for Software Performance Measurement., , , , , and . OSS, volume 319 of IFIP Advances in Information and Communication Technology, page 1-14. Springer, (2010)Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach., and . SIGMETRICS Perform. Evaluation Rev., 35 (2): 3-5 (2007)Guest Editorial: Security and Dependability in SOA and Business Processes., , and . IEEE Trans. Serv. Comput., 4 (4): 255-256 (2011)Fuzzy service selection in a distributed object-oriented environment., , and . IEEE Trans. Fuzzy Syst., 9 (5): 682-698 (2001)An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits., , , and . STM, volume 11738 of Lecture Notes in Computer Science, page 158-167. Springer, (2019)Preface., , and . J. Syst. Archit., 52 (11): 609 (2006)