From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Context-aware role-based access control in pervasive computing systems., и . SACMAT, стр. 113-122. ACM, (2008)Provenance Issues in Platform-as-a-Service Model of Cloud Computing.. HotCloud, USENIX Association, (2015)Application-Level Recovery Mechanisms for Context-Aware Pervasive Computing., и . SRDS, стр. 13-22. IEEE Computer Society, (2008)A Framework for Integrating Network Information into Distributed Iterative Solution of Sparse Linear Systems., и . VECPAR, том 2565 из Lecture Notes in Computer Science, стр. 436-450. Springer, (2002)Design studies for a 10 MW direct drive superconducting wind generator., , , и . IECON, стр. 497-501. IEEE, (2014)Dynamic Network Information Collectionfor Distributed Scientific Application Adaptation., и . HiPC, том 2552 из Lecture Notes in Computer Science, стр. 555-563. Springer, (2002)Context-Based Secure Resource Access in Pervasive Computing Environments., , , , и . PerCom Workshops, стр. 159-163. IEEE Computer Society, (2004)A specification model for context-based collaborative applications., , и . Pervasive Mob. Comput., 1 (1): 21-42 (2005)Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system., , , , , , и . Softw. Pract. Exp., 37 (5): 493-522 (2007)A fine-grained access control model for key-value systems.. CODASPY, стр. 161-164. ACM, (2013)