Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capitalizing on Awareness of User Tasks for Guiding Self-Adaptation., , , and . CAiSE Workshops (2), page 83-96. FEUP Edições, Porto, (2005)Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model., and . CSE (3), page 438-443. IEEE Computer Society, (2009)A general model for trust management., and . IJIPSI, 1 (1): 79-105 (2011)Space-aware TeC: End-user development of safety and control systems for smart spaces., , and . SMC, page 2914-2921. IEEE, (2010)Challenges and architectural approaches for authenticating mobile users.. SAM@ICSE, page 15-20. ACM, (2008)Software Architecture-Based Adaptation for Pervasive Systems., , , , , , and . ARCS, volume 2299 of Lecture Notes in Computer Science, page 67-82. Springer, (2002)Using Architectural Style as a Basis for System Self-repair., , , , , and . WICSA, volume 224 of IFIP Conference Proceedings, page 45-59. Kluwer, (2002)Leveraging Resource Prediction for Anticipatory Dynamic Configuration., , , , , and . SASO, page 214-223. IEEE Computer Society, (2007)TeC apps for smart spaces: simple, decentralized, resilient, and self-healing., , , and . UbiComp, page 637-638. ACM, (2012)Dynamic Configuration of Resource-Aware Services., , , and . ICSE, page 604-613. IEEE Computer Society, (2004)