Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An object finder for program structure understanding in software maintenance., , , and . Journal of Software Maintenance, 6 (5): 261-283 (1994)On storage optimization of horizontal microprograms., , and . MICRO, page 98-106. ACM, (1974)Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware., , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 972-981. Springer, (2004)Software Engineering Meets Services and Cloud Computing., and . Computer, 44 (10): 47-53 (2011)An Energy-Efficient Object Discovery Protocol for Context-Sensitive Middleware for Ubiquitous Computing., and . IEEE Trans. Parallel Distributed Syst., 14 (11): 1074-1085 (2003)Controlled privacy preserving keyword search., and . AsiaCCS, page 321-324. ACM, (2008)Tensor-Train-Based High-Order Dominant Eigen Decomposition for Multimodal Prediction Services., , , , and . IEEE Trans. Engineering Management, 68 (1): 197-211 (2021)Toward Development of Adaptive Service-Based Software Systems., , , , , , and . IEEE Trans. Serv. Comput., 2 (3): 247-260 (2009)An Approach to Data Confidentiality Protection in Cloud Environments., , and . Int. J. Web Serv. Res., 9 (3): 67-83 (2012)Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things., , , , , and . IEEE Internet Things J., 9 (13): 10625-10639 (2022)