Author of the publication

Utility Computing Simulation

, , , and . ESM'2009 The 2009 European Simulation and Modelling Conference, page 175--180. Leicester, United Kingdom, EUROSIS-ETI, (October 2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View., , , and . HCI (8), volume 6768 of Lecture Notes in Computer Science, page 129-135. Springer, (2011)Security aspects of an enterprise-wide network architecture., , , and . Internet Res., 9 (1): 8-15 (1999)Commoditization as a Criterion for Semantic Service Provisioning., , , and . INC, page 325-334. University of Plymouth, (2010)Optimisation in Multi-Agent Systems., , and . INC, page 271-280. University of Plymouth, (2008)Co-Processor Aided Attack on Embedded Multi-OS Environments., , and . ICITCS, page 1-4. IEEE Computer Society, (2013)A Quorum RFID System Using Threshold Cryptosystem., , , and . FiCloud, page 107-113. IEEE Computer Society, (2016)Utility Computing Simulation, , , and . ESM'2009 The 2009 European Simulation and Modelling Conference, page 175--180. Leicester, United Kingdom, EUROSIS-ETI, (October 2009)The Acceptance and Consulting Quality of Automatic Emergency Call Systems for Cars., , , and . CERC, volume 2348 of CEUR Workshop Proceedings, page 175-184. CEUR-WS.org, (2019)The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition., and . ICISSP, page 322-328. SciTePress, (2015)A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function., , , and . ICUFN, page 165-171. IEEE, (2017)