Author of the publication

An Algorithm for Building User-Role Profiles in a Trust Environment.

, , , , and . DaWaK, volume 2454 of Lecture Notes in Computer Science, page 104-113. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A WSN Testbed for Z-Order Encoding Based Multi-Modal Sensor Data Compression., , and . SECON, page 1-2. IEEE, (2017)On compressing data in wireless sensor networks for energy efficiency and real time delivery., and . Distributed Parallel Databases, 31 (2): 151-182 (2013)Secure and Privacy-preserving Traffic Monitoring in VANETs., and . MASS, page 567-575. IEEE, (2020)Storing DTD-Conscious XML Data in XEDY., , , and . EC-Web, volume 2738 of Lecture Notes in Computer Science, page 270-280. Springer, (2003)A Model for XML Schema Integration., , , , , and . EC-Web, volume 2455 of Lecture Notes in Computer Science, page 193-202. Springer, (2002)Securing a Wireless Networked Control System Using Information Fusion., and . SRDS, page 475-476. IEEE Computer Society, (2012)Middleware for supporting content sharing in dynamic networks., , , , and . MILCOM, page 1658-1663. IEEE, (2011)Detecting and Representing Relevant Web Deltas using Web Join., , , and . ICDCS, page 246-253. IEEE Computer Society, (2000)Cost-Benefit Analysis of Web Bag in a Web Warehouse., , , and . IDEAS, page 34-42. IEEE Computer Society, (1999)A Communication Efficient Framework for Finding Outliers in Wireless Sensor Networks., , , and . Mobile Data Management, page 301-302. IEEE Computer Society, (2010)