From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Approach for Reducing the Gap between BPMN Models and Implementation Artifacts., , , , , , , , , и 1 other автор(ы). RITA, 16 (2): 83-86 (2009)Transparent Resource Allocation to Exploit Idle Cluster Nodes in Computational Grids., , , , , и . e-Science, стр. 238-245. IEEE Computer Society, (2005)Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types., , , , , , , , , и 1 other автор(ы). RITA, 16 (2): 97-98 (2009)Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition., , , , , , , , , и 1 other автор(ы). ICSOC/ServiceWave, том 5900 из Lecture Notes in Computer Science, стр. 649-650. (2009)Semantic Web and Knowledge Management in User Data Privacy., , , , , , , , и . RITA, 16 (2): 69-70 (2009)Incorporating Security Requirements into Service Composition: From Modelling to Execution., , , , , , , , , и 1 other автор(ы). ICSOC/ServiceWave, том 5900 из Lecture Notes in Computer Science, стр. 373-388. (2009)Representation and Inference of Privacy Risks Using Semantic Web Technologies., , , , , , , , , и 1 other автор(ы). EKAW (Posters and Demos), том 674 из CEUR Workshop Proceedings, CEUR-WS.org, (2010)Scheduling BoT Applications in Grids Using a Slave Oriented Adaptive Algorithm., , и . ISPA, том 3358 из Lecture Notes in Computer Science, стр. 392-398. Springer, (2004)