Author of the publication

Cyber Physical IoT Device Management Using a Lightweight Agent.

, , , and . iThings/GreenCom/CPSCom/SmartData, page 1009-1014. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence of a boundary integral method for 3D interfacial Darcy flow with surface tension., , and . Math. Comput., 86 (308): 2745-2775 (2017)Influence of Surfactant on Rounded and Pointed Bubbles in Two-Dimensional Stokes Flow.. SIAM J. Appl. Math., 59 (6): 1998-2027 (1999)Convergence of the boundary integral method for interfacial Stokes flow., , and . CoRR, (2021)Convergence of the boundary integral method for interfacial Stokes flow., , and . Math. Comput., 92 (340): 695-748 (November 2022)Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets., , and . AMCIS, Association for Information Systems, (2023)Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming., , , and . ICISSP, page 112-119. SCITEPRESS, (2024)From Testing Theory to Test Driver Implementation., and . FME, volume 1051 of Lecture Notes in Computer Science, page 538-556. Springer, (1996)Collapse Versus Blow-Up and Global Existence in the Generalized Constantin-Lax-Majda Equation., , and . J. Nonlinear Sci., 31 (5): 82 (2021)The Code Validation Tool CVT: Automatic Verification of a Compilation Process., , and . Int. J. Softw. Tools Technol. Transf., 2 (2): 192-201 (1998)Translation Validation for Synchronous Languages., , and . ICALP, volume 1443 of Lecture Notes in Computer Science, page 235-246. Springer, (1998)