Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A resource-oriented grid meta-scheduler based on agents., and . Parallel and Distributed Computing and Networks, page 108-113. IASTED/ACTA Press, (2007)Dynamic risk evaluation model as a security field., , , and . GCCE, page 628-629. IEEE, (2015)Local dominance and controlling dominance area of solutions in multi and many objectives EAs., , and . GECCO (Companion), page 1811-1814. ACM, (2008)Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization., , and . GECCO (Companion), page 1201-1204. ACM, (2015)Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization., , and . GECCO, page 753-760. ACM, (2011)Communication in Linda/Q : Datatypes and Unification., and . ICPP (2), page 219-226. CRC Press, (1991)Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance., , , , and . COMPSAC Workshops, page 100-105. IEEE Computer Society, (2012)A Cloud Trust Model in a Security Aware Cloud., , and . SAINT, page 121-124. IEEE Computer Society, (2010)Federated Authentication in a Hierarchy of IdPs by Using Shibboleth., and . SAINT, page 327-332. IEEE Computer Society, (2011)Detection of Irregularities and Rips by Finding Critical Points of Morse Theory - Preliminary Results on Analysis on Sales Data., , , and . COMPSAC (2), page 386-390. IEEE Computer Society, (2017)978-1-5386-0367-3.