Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Controlled Task Migration in HARNESS., and . PDPTA, CSREA Press, (2000)The Harness Metacomputing Framework., and . PPSC, (1999)A Standard Interface For Grid-powered Parametric Optimization., and . GCA, page 180-185. CSREA Press, (2007)Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications., , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 1019-1026. Springer, (2017)Towards energy-aware intrusion detection systems on mobile devices., , , and . HPCS, page 289-296. IEEE, (2013)A Denial of Service Attack to GSM Networks via Attach Procedure., , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 361-376. Springer, (2013)On energy-based profiling of malware in Android., , and . HPCS, page 535-542. IEEE, (2014)Mobile interfaces to computational, data, and service grid systems., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 6 (4): 71-73 (2002)PVM Emulation in the Harness Metacomputing System: A Plug-in Based Approach., and . PVM/MPI, volume 1697 of Lecture Notes in Computer Science, page 117-124. Springer, (1999)CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices., , , , , and . ACM Trans. Cyber Phys. Syst., 4 (3): 34:1-34:19 (2020)