Author of the publication

Firewall Queries.

, , , and . OPODIS, volume 3544 of Lecture Notes in Computer Science, page 197-212. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Firewall Queries., , , and . OPODIS, volume 3544 of Lecture Notes in Computer Science, page 197-212. Springer, (2004)Automatic Mash Up of Composite Applications., , , and . ICSOC, volume 5364 of Lecture Notes in Computer Science, page 317-330. (2008)Aggregated Search over Personal Process Description Graph., , , and . DEXA (2), volume 9828 of Lecture Notes in Computer Science, page 254-262. Springer, (2016)Identifying Fake Feedback for Effective Trust Management in Cloud Environments., , , , and . ICSOC Workshops, volume 7759 of Lecture Notes in Computer Science, page 47-58. Springer, (2013)SourceVote: Fusing Multi-valued Data via Inter-source Agreements., , , , , and . ER, volume 10650 of Lecture Notes in Computer Science, page 164-172. Springer, (2017)Experimentation and Analysis of Ensemble Deep Learning in IoT Applications., , , , and . Open J. Internet Things, 5 (1): 133-149 (2019)Discovery and cataloging of deep Web sources., , , and . IRI, page 224-230. IEEE, (2012)Semantic Brokering over Dynamic Heterogeneous Data Sources in InfoSleuth., , and . ICDE, page 358-365. IEEE Computer Society, (1999)Enabling ScientificWorkflow Reuse through Structured Composition of Dataflow and Control-Flow., , , and . ICDE Workshops, page 70. IEEE Computer Society, (2006)Query optimisation in multidatabase systems using query classification., , and . SAC, page 173-177. ACM, (1996)