Author of the publication

A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration.

, , and . PDCAT, page 82-86. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis., , , and . CoRR, (2023)Online Action Detection in Untrimmed, Streaming Videos - Modeling and Evaluation., , , , , , , and . CoRR, (2018)Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets., , , , and . WETICE, page 313-318. IEEE Computer Society, (2006)Rate Control of Elastic Traffic with QoS Guarantees: a Stability Analysis & Experimental Implementation., , and . NOMS, IEEE, (2006)Toward a Methodology for Agent-Based Data Mining and Visualization., , , and . ADMI, volume 7103 of Lecture Notes in Computer Science, page 4-15. Springer, (2011)User-Controlled Collaborations in the Context of Trust Extended Environments., , , , , and . WETICE, page 389-394. IEEE Computer Society, (2007)A practical user mobility prediction algorithm for supporting adaptive QoS in wireless networks., and . ICON, page 104-111. IEEE, (1999)Practical Sized Typing for Coq., and . CoRR, (2019)A Linked Data Quality Assessment Framework for Network Data., , , , and . GRADES/NDA@SIGMOD/PODS, page 4:1-4:8. ACM, (2019)How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles., , , , and . SPACE, volume 13783 of Lecture Notes in Computer Science, page 249-263. Springer, (2022)