Author of the publication

Bridging Education and Labor Skills by a Novel Competency-Based Course Linked-Data Model.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy management strategy in cloud computing: a perspective study., and . J. Supercomput., 74 (12): 6569-6597 (2018)Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 11514-11543 (November 2023)Towards an agent based framework for the design of secure web services., , and . SWS, page 81-86. ACM, (2008)Advanced distributed architecture for a complex and large scale Arabic handwriting recognition framework., , and . IJHPCN, 10 (6): 505-514 (2017)XtremDew: a platform for cooperative tasks and data schedulers., , , , and . Int. J. High Perform. Comput. Netw., 16 (1): 55-66 (2020)Towards a Better Security in Public Cloud Computing., , and . HIS, volume 1179 of Advances in Intelligent Systems and Computing, page 441-453. Springer, (2019)Mitigation of Sybil Attacks in Structured P2P Overlay Networks., and . SKG, page 245-248. IEEE Computer Society, (2012)Co-scheduling Data and Task for a Data-Driven Distribution of Data-Intensive Applications., , and . AICCSA, page 407-414. IEEE Computer Society, (2017)Towards trusted volunteer grid environments, and . CoRR, (2010)Securing Structured P2P Overlay Networks., and . 3PGCIC, page 37-43. IEEE, (2013)