Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Alarm Correlation for Fault Identification., and . INFOCOM, page 553-561. IEEE Computer Society, (1995)Business Users and Program Variability: Bridging the Gap., , , , and . ICSR, volume 3107 of Lecture Notes in Computer Science, page 11-22. Springer, (2004)CloudLEGO: scalable cross-VM-type application performance prediction., , , , , , and . SoCC, page 40:1. ACM, (2013)Topology Identification Algorithm For Network Management., and . NOMS, page 242-253. (1992)Cross-domain service management for enabling domain autonomy in a federated SOA., , , and . CNSM, page 475-480. IEEE, (2010)A Distributed Object Oriented Framework to Offer Transactional Support for Long Running Business Processes., , , , , , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 331-348. Springer, (2000)Volley: Violation Likelihood Based State Monitoring for Datacenters., , , and . ICDCS, page 1-10. IEEE Computer Society, (2013)An Access Control System for Web Service Compositions., , , , and . ICWS, page 1-8. IEEE Computer Society, (2007)Modeling of software concerns in Cosmos., and . AOSD, page 127-133. ACM, (2002)A Middleware System Which Intelligently Caches Query Results., , , and . Middleware, volume 1795 of Lecture Notes in Computer Science, page 24-44. Springer, (2000)