Author of the publication

An analytical study of cache invalidation algorithms in mobile environments.

, , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cost Based Coordination Model for Long Running Transactions in Web Services., , and . iiWAS, volume 196 of books@ocg.at, page 97-108. Austrian Computer Society, (2005)Integration of Heterogeneous Web Service Components., and . WSMAI, page 87-94. INSTICC Press, (2004)Efficient privacy preservation of big data for accurate data mining., , , , and . Inf. Sci., (2020)Privacy preserving distributed machine learning with federated learning., , , , and . Comput. Commun., (2021)APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control., , and . EuroPLoP, page 331-346. UVK - Universitaetsverlag Konstanz, (2001)PPaaS: Privacy Preservation as a Service., , , , and . CoRR, (2020)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Authorization Control for a Semantic Data Repository through an Inference Policy Engine., , and . IEEE Trans. Dependable Secur. Comput., 10 (6): 328-340 (2013)Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol., , , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 558-576. Springer, (2007)MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise., , , , and . PAKDD (2), volume 10938 of Lecture Notes in Computer Science, page 483-494. Springer, (2018)