Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OCPP security - Neural network for detecting malicious traffic., and . RACS, page 190-195. ACM, (2017)Data Capsule: Representation of Heterogeneous Data in Cloud-Edge Computing., , , , , and . IEEE Access, (2019)Adapting MCP and HLFET Algorithms to Multiple Simultaneous Scheduling., , and . Int. J. Parallel Program., 46 (3): 607-629 (2018)Drop computing: Ad-hoc dynamic collaborative computing., , , , , and . Future Gener. Comput. Syst., (2019)Elastic stack in action for smart cities: Making sense of big data., , and . ICCP, page 469-476. IEEE, (2017)Middleware and architectures for space-based and situated computing., , , and . Int. J. Space Based Situated Comput., 1 (1): 43-58 (2011)Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments., , , , , and . Int. J. Web Grid Serv., 11 (1): 4-20 (2015)NETIoT: A Versatile IoT Platform Integrating Sensors and Applications., , , , , , and . GIoTS, page 1-6. IEEE, (2018)Adaptive method to support social-based mobile networks using a pagerank approach., , and . Concurr. Comput. Pract. Exp., 27 (8): 1900-1912 (2015)Cyber Defence Capabilities in Complex Networks., , , and . Internet of Everything, Springer, (2018)