Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Halftoning Algorithms to Location Dependent Sensor Placement., , , , , and . ISCAS, page 161-164. IEEE, (2009)Federated AI for the Enterprise: A Web Services Based Implementation., , and . ICWS, page 20-27. IEEE, (2019)Authentication for Distributed Web Caches., , , and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 126-145. Springer, (2002)Self-Generating Policies for Machine Learning in Coalition Environments., , , , , , , , , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 42-65. Springer, (2018)A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment., , , and . CoRR, (2019)A Security-Constrained Reinforcement Learning Framework for Software Defined Networks., , , and . ICC, page 1-6. IEEE, (2021)Tree Computation for Reserved Bandwidth Traffic., and . J. High Speed Networks, 3 (4): 513-533 (1994)Audio Analysis as a Control Knob for Social Sensing., , , , and . SocialSens@CPSWeek, page 75-80. ACM, (2017)A Policy-based Approach for Measuring Data Quality., , , , and . IEEE BigData, page 4025-4031. IEEE, (2019)Provenance-Based Analytics Services for Access Control Policies., , , , , , and . SERVICES, page 94-101. IEEE Computer Society, (2017)