Author of the publication

Evaluation of virtual learning environments for the teaching of students with down syndrome.

, , , and . SMC, page 1179-1184. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Model Generation for Cloud Infrastructure Planning., , , , , and . SMC, page 4098-4103. IEEE, (2013)A Strategy for Performance Evaluation and Modeling of Cloud Computing Services., , , and . RITA, 26 (1): 78-90 (2019)Execution Support to Long Running Workflows., , and . CIT, page 496-503. IEEE Computer Society, (2014)Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud., , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)Incorporating Security Requirements into Service Composition: From Modelling to Execution., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 373-388. (2009)Invasive technique for measuring the energy consumption of mobile devices applications in mobile cloud environments., , , , and . SMC, page 2724-2729. IEEE, (2017)A multi-perspective methodology for evaluating the security maturity of data centers., , and . SMC, page 1196-1201. IEEE, (2017)Comparative Study of Service-Based Security-Aware Business Processes Automation Tools., , , , and . SMC, page 1413-1418. IEEE, (2013)Capacity planning of EFT service hosted on elastic IaaS., , , , , and . SMC, page 1749-1754. IEEE, (2012)A survey on automation of security requirements in service-based business processes., , and . Int. J. Web Eng. Technol., 13 (1): 3-29 (2018)