Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Running stability of hydraulic confined piston engine based on virtual prototype., , , and . RAM, page 291-294. IEEE, (2011)A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation., , and . AWIC, volume 43 of Advances in Soft Computing, page 142-147. Springer, (2007)Deep Learning-based Cooperative Trail Following for Multi-Robot System., , , and . IJCNN, page 1-8. IEEE, (2018)Hiding "real" machine from attackers and malware with a minimal virtual machine monitor., , and . SecureComm, page 21. ACM, (2008)AT-RBAC: An Authentication Trustworthiness-Based RBAC Model., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 343-350. Springer, (2004)Exploring the patterns of social behavior in GitHub., , , and . CrowdSoft@SIGSOFT FSE, page 31-36. ACM, (2014)Together: A Hybrid Overlay for Application-Layer Multicast in Heterogeneous Environment., , , and . GPC, volume 5036 of Lecture Notes in Computer Science, page 364-372. Springer, (2008)ZebraX: A Model for Service Composition with Multiple QoS Constraints., , , , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 614-626. Springer, (2007)A Secure Virtual Execution Environment for Untrusted Code., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 156-167. Springer, (2007)An Adaptive Algorithm for Failure Recovery During Dynamic Service Composition., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 41-48. Springer, (2007)