Author of the publication

Hierarchical situation modeling and reasoning for pervasive computing.

, and . SEUS/WCCIA, page 5-10. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Communication in the Design of Software Components of Distributed Computer Systems., and . ICDCS, page 280-287. IEEE Computer Society, (1982)On storage optimization of horizontal microprograms., , and . MICRO, page 98-106. ACM, (1974)Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware., , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 972-981. Springer, (2004)Controlled privacy preserving keyword search., and . AsiaCCS, page 321-324. ACM, (2008)Ripple effect analysis of software maintenance., , and . COMPSAC, page 60-65. IEEE, (1978)Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts., , , , and . Computer, 54 (12): 72-80 (2021)Statistical properties of linear multi-category pattern classifiers based on the least-mean-square error criterion (Corresp.)., and . IEEE Trans. Inf. Theory, 14 (5): 778-780 (1968)On the Design of Easily Testable Sequential Machines, and . SWAT, page 38-42. IEEE Computer Society, (1971)Sequential feature extraction for waveform recognition., and . AFIPS Spring Joint Computing Conference, volume 36 of AFIPS Conference Proceedings, page 65-76. AFIPS Press, (1970)A Framework for Specifying and Managing Security Requirements in Collaborative Systems., and . ATC, volume 4158 of Lecture Notes in Computer Science, page 500-510. Springer, (2006)