Author of the publication

A semantic publish/subscribe system

, and . E-Commerce Technology for Dynamic E-Business, 2004. IEEE International Conference on, (September 2004)
DOI: 10.1109/CEC-EAST.2004.8

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ad Hoc Networking with Mobile IP, and . Proceedings of 2nd European Personal Mobile Conference (EPMCC), page 197-202. Bonn, Germany, (September 1997)Design, Synthesis and X-ray Structure of Protein-Ligand Complexes: Important Insight into Selectivity of Memapsin 2 (<img src="http://pubs.acs.org/images/gifchars/beta2.gif" border="0" align="middle">-Secretase) Inhibitors, , , , , , , , , and 2 other author(s). J. Am. Chem. Soc., 128 (16): 5310--5311 (April 2006)InN clusters in In$_x$Ga$_1-x$N quantum wells: analysis of bond lengths, , , , , and . physica status solidi (c), 4 (7): 2449-2452 (2007)Queuing Analysis of Power Management in the IEEE 802.11 Based Wireless LANs, and . Wireless Communications, IEEE Transactions on, 6 (4): 1286-1294 (April 2007)S-means: Similarity Driven Clustering and Its application in Gravitational-Wave Astronomy Data Mining, , , , and . Proceedings of The International Workshop on Knowledge Discovery from Ubiquitous Data Streams (IWKDUDS 2007), Warsaw, Poland, (September 2007)Thin-film Transistor-based Tribotronic Artificial Synapse with Neurosensory Behavior., , and . ICICDT, page 136-140. IEEE, (2023)A semantic publish/subscribe system, and . E-Commerce Technology for Dynamic E-Business, 2004. IEEE International Conference on, (September 2004)Discovery of conjoined charge density waves in the kagome superconductor CsV$_3$Sb$_5$, , , , , , , , , and 11 other author(s). Nat. Commun., 13 (6348): 6348 (Oct 26, 2022)https://arxiv.org/abs/2202.13530.Automated Vulnerability Detection in Source Code Using Deep Representation Learning., , , , , , , and . ICMLA, page 757-762. IEEE, (2018)Neural signal processing and closed-loop control algorithm design for an implanted neural recording and stimulation system., , , , , , , , , and 2 other author(s). EMBC, page 7831-7836. IEEE, (2015)