Author of the publication

Performance Evaluation and Modeling of Web Services Security.

, , , and . ICWS, page 431-438. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proceedings of the typography interest group ACM CHI'85., , , , and . ACM SIGCHI Bull., 17 (1): 9-15 (1985)Modelling Business Services with Situation Theory., and . ASWEC (2), page 153-156. ACM, (2015)Host Load Prediction for Grid Computing Using Free Load Profiles., and . ICA3PP, volume 3719 of Lecture Notes in Computer Science, page 336-344. Springer, (2005)The Fastap Keypad and Pervasive Computing.. Pervasive, volume 2414 of Lecture Notes in Computer Science, page 58-68. Springer, (2002)WLAN power consumption analytical model., and . WMNC, page 101-106. IEEE, (2012)Modelling Collaborative Services for Business and QoS Compliance., , , , and . ICWS, page 299-306. IEEE Computer Society, (2011)A Mobile Learning System for Syndromic Surveillance and Diagnosis., , and . ICALT, page 48-52. IEEE Computer Society, (2010)Clustering of DNA microarray temporal data based on the autoregressive model., , and . SMC, page 71-75. IEEE, (2008)Suggestions on Pattern Transformation in UML-RT., and . ICSEA, page 17. IEEE Computer Society, (2007)The LEGO Mindstorms NXT Idea Book: Design, Invent, and Build., , , , , , , , , and 1 other author(s). Ubiquity, 2007 (December): 4:2 (2007)