Author of the publication

An analytical study of cache invalidation algorithms in mobile environments.

, , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of Heterogeneous Web Service Components., and . WSMAI, page 87-94. INSTICC Press, (2004)PPaaS: Privacy Preservation as a Service., , , , and . CoRR, (2020)A Cost Based Coordination Model for Long Running Transactions in Web Services., , and . iiWAS, volume 196 of books@ocg.at, page 97-108. Austrian Computer Society, (2005)APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control., , and . EuroPLoP, page 331-346. UVK - Universitaetsverlag Konstanz, (2001)Efficient privacy preservation of big data for accurate data mining., , , , and . Inf. Sci., (2020)Privacy preserving distributed machine learning with federated learning., , , , and . Comput. Commun., (2021)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Authorization Control for a Semantic Data Repository through an Inference Policy Engine., , and . IEEE Trans. Dependable Secur. Comput., 10 (6): 328-340 (2013)Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol., , , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 558-576. Springer, (2007)Mobility-Aware Cache Replacement for Users of Location-Dependent Services., , and . LCN, page 50-58. IEEE Computer Society, (2004)