Author of the publication

Analysis and Characteristics of Automatic Reconfiguration Mechanisms in IoT Devices Network.

, , , , , , and . ISAT (2), volume 430 of Advances in Intelligent Systems and Computing, page 215-225. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Excess-Mass and Mass-Volume anomaly detection algorithms applicability in unsupervised intrusion detection systems., , and . WETICE, page 131-136. IEEE, (2021)Regional Center of Cybersecurity anomaly detection module efficiency in network monitoring scenarios., , and . WETICE, page 107-112. IEEE, (2021)Practical Implementation of Internet of Things Service Systems Architecture., , , and . ICSEng, page 291-298. IEEE Computer Society, (2017)Enabling automatic composition of stream processing services through ontology-based standardization., , , and . Healthcom, page 88-93. IEEE, (2014)Universal Platform for Composite Data Stream Processing Services Management., , , and . DepCoS-RELCOMEX, volume 224 of Advances in Intelligent Systems and Computing, page 399-407. Springer, (2013)Methods for effective and reliable resource allocation in service-oriented systems., and . WETICE, page 131-134. IEEE, (2020)Planning-Based Method for Communication Protocol Negotiation in a Composition of Data Stream Processing Services., , , , , and . CN, volume 370 of Communications in Computer and Information Science, page 531-540. Springer, (2013)Communication Protocol Negotiation in a Composite Data Stream Processing Service., , and . ICSS, volume 240 of Advances in Intelligent Systems and Computing, page 681-690. Springer, (2013)Computer Aided Scheduling and Routing of Vehicle-Carrier Fleet - A Case Study., , , and . ISAT (1), volume 429 of Advances in Intelligent Systems and Computing, page 227-237. Springer, (2015)Trust-based security-level evaluation method for dynamic service-oriented environments., , , , , , and . Concurr. Comput. Pract. Exp., 27 (18): 5700-5718 (2015)