Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Availability of Images Posted on Social Media Sites., and . ICCCN, page 1-5. IEEE, (2012)Leveraging Public Resource Pools to Improve the Service Compliances of Computing Utilities., and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 242-251. Springer, (2004)A secured hierarchical trust management framework for public computing utilities., , and . CASCON, page 185-199. IBM, (2005)Design of a context aware object model for smart spaces, things, and people., , and . ICC, page 710-715. IEEE, (2015)A fog computing framework for autonomous driving assist: architecture, experiments, and challenges., , and . CASCON, page 24-33. ACM, (2019)Social Authentication Protocol for Mobile Phones., and . CSE (4), page 436-441. IEEE Computer Society, (2009)Towards a Model for Intelligent Context-Sensitive Computing for Smart Cities., , and . Handbook of Smart Cities, Software Services and Cyber Infrastructure, Springer, (2018)Trusted Gossip: A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing., and . AINA, page 702-707. IEEE Computer Society, (2007)MetaGrid: A Scalable Framework for Wide-Area Service Deployment and Management ., , , and . HPCS, page 61-70. IEEE Computer Society, (2002)Measuring Scalability of Resource Management Systems., , and . IPDPS, IEEE Computer Society, (2005)