Author of the publication

Deployment, configuration and management of mobile actor systems.

, , and . IASTED Conf. on Software Engineering and Applications, page 483-488. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of a multi-agent system over a multi-core cluster managed by Terracotta., , , and . SpringSim (TMS-DEVS), page 125-133. SCS/ACM, (2011)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., and . SIGSIM-PADS, page 101-104. ACM, (2018)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)Integration and Interoperability between Jini services andWeb Services., , and . IEEE SCC, page 278-285. IEEE Computer Society, (2007)Toward a Log-based Anomaly Detection System for Cyber Range Platforms., , and . ARES, page 115:1-115:9. ACM, (2024)Using CalcuList To MapReduce Json Documents., and . SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks., , , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 263-274. Springer, (2014)A Simulation Model for the Analysis of DDoS Amplification Attacks., , , and . UKSim, page 267-272. IEEE, (2015)A cloud based framework for Emergency Management: experiences in Calabria Region., , , , , , , , , and . SEBD, volume 2037 of CEUR Workshop Proceedings, page 275. CEUR-WS.org, (2017)CalcuList: a Functional Language Extended with Imperative Features., and . CoRR, (2018)