Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving from data modeling to process modeling in CIM., , and . Integrated Network Management, page 673-686. IEEE, (2005)Design of the Ajanta system for mobile agent programming., , , , , , , and . J. Syst. Softw., 62 (2): 123-140 (2002)Building Applications Using End to End Composition of Web Services., , , , , , , , and . AAAI, page 1672-1673. AAAI Press / The MIT Press, (2005)A service creation environment based on end to end composition of Web services., , , , , , and . WWW, page 128-137. ACM, (2005)Synchronization Analysis for Decentralizing Composite Web Services., and . SAC, page 407-414. ACM, (2003)A Security Architecture for Mobile Agents in Ajanta., and . ICDCS, page 402-409. IEEE Computer Society, (2000)Protected Resource Access for Mobile Agent-based Distributed Computing., and . ICPP Workshops, page 144-154. IEEE Computer Society, (1998)Configuration management in the Nexus distributed operating system., , , , , , and . Concurr. Pract. Exp., 6 (4): 325-338 (1994)An information model for metering and accounting., , and . NOMS (1), page 541-554. IEEE, (2004)Delegation of Privileges to Mobile Agents in Ajanta., and . International Conference on Internet Computing, page 379-386. CSREA Press, (2000)