Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of service searching using aggregation in peer-to-peer Service Overlay Networks., , and . Integrated Network Management, page 642-645. IEEE, (2011)A Survey of Cloud Computing Migration Issues and Frameworks., , and . WorldCIST (1), volume 275 of Advances in Intelligent Systems and Computing, page 161-170. Springer, (2014)Peer Selection in P2P Service Overlays Using Geographical Location Criteria., , and . ICCSA (2), volume 7334 of Lecture Notes in Computer Science, page 234-248. Springer, (2012)Driving Workload Indicators: The Case of Senior Drivers., , , and . AHFE (20), volume 604 of Advances in Intelligent Systems and Computing, page 604-615. Springer, (2017)Human-Centered Design - The Importance of Usability Tests in the Development of Technological Objects., , , and . AHFE (3), volume 1203 of Advances in Intelligent Systems and Computing, page 331-338. Springer, (2020)A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure., , , , and . SAINT, page 100-108. IEEE Computer Society, (2002)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)A Network Intrusion Detection System for Building Automation and Control Systems., , and . IEEE Access, (2023)Integration of PXE-based desktop solutions into broadband access networks., , , and . CNSM, page 182-189. IEEE, (2010)