Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile computing at the edge (keynote).. MOBILESoft, page 69-70. ACM, (2014)An Approach to Analysis and Design for COTS-Based Systems.. ICCBSS, volume 3412 of Lecture Notes in Computer Science, page 236-247. Springer, (2005)Authentication and Authorization for IoT Devices in Disadvantaged Environments., , , and . WF-IoT, page 368-373. IEEE, (2019)Cyber-foraging for improving survivability of mobile systems., , , and . MILCOM, page 1421-1426. IEEE, (2015)Cloud Computing.. Computer, 50 (5): 8-9 (2017)Supporting Migration to Services using Software Architecture Reconstruction., , and . STEP, page 81-91. IEEE Computer Society, (2005)Analyzing the Reuse Potential of Migrating Legacy Components to a Service-Oriented Architecture., , and . CSMR, page 15-23. IEEE Computer Society, (2006)Challenges for assuring quality of service in a service-oriented environment., , , , and . PESOS@ICSE, page 103-106. IEEE Computer Society, (2009)A plug-in architecture for connecting to new data sources on mobile devices., , , , , and . VL/HCC, page 51-58. IEEE Computer Society, (2013)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)