Author of the publication

Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems.

, , , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2238-2250 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigation of the waste-removal chain through pervasive computing., , , , , , , , and . IBM J. Res. Dev., 55 (1): 11 (2011)Correctness and performance of the ATM ABR rate control scheme., , and . Comput. Networks, 35 (2-3): 237-261 (2001)Efficient computation of multivariate empirical distribution functions at the observed values., and . Comput. Stat., 33 (3): 1413-1428 (2018)Entropy and energy conservation for thermal atmospheric dynamics using mixed compatible finite elements., , and . J. Comput. Phys., (January 2024)Electronic Contract Signing Without Using Trusted Third Party., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 386-394. Springer, (2015)Biased Assimilation, Homophily and the Dynamics of Polarization, , and . CoRR, (2012)Helio X20: The first tri-gear mobile SoC with CorePilot™ 3.0 technology., , , , , , , , , and 9 other author(s). Hot Chips Symposium, page 1-24. IEEE, (2016)The PowerPC 603 Microprocessor: Performance Analysis and Design Trade-offs., , , , , , , and . COMPCON, page 316-323. IEEE Computer Society, (1994)Global Telescience featuring IPv6 at iGrid2002., , , , , , , and . Future Gener. Comput. Syst., 19 (6): 1031-1039 (2003)Prevention of deadlocks and livelocks in lossless backpressured packet networks., , and . IEEE/ACM Trans. Netw., 11 (6): 923-934 (2003)