Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Critical Risks Associated with Enterprise Cloud Computing., , and . CloudComp, volume 133 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 132-141. Springer, (2013)A knowledge based approach for handling supply chain risk management., , and . BCI, page 70-75. ACM, (2012)Modelling and analysis of sustainable freight transportation., , , , and . Int. J. Prod. Res., 57 (19): 6086-6089 (2019)Risks in Enterprise Cloud Computing: The Perspective of it Experts., , and . J. Comput. Inf. Syst., 53 (4): 39-48 (2013)Enhancing efficiency and interpretability: A multi-objective dispatching strategy for autonomous service vehicles in ride-hailing., , , , and . Comput. Ind. Eng., (2024)Learning and Leveraging the Relationship between Architecture-Level Measurements and Individual User Satisfaction, , , , , , and . SIGARCH Comput. Archit. News, 36 (3): 427--438 (2008)Tertiary Storage Organization for Large Multidimensional Datasets., and . IEEE Symposium on Mass Storage Systems, page 203-210. (2000)High Performance Parallel/Distributed Biclustering Using Barycenter Heuristic., , , and . SDM, page 1050-1061. SIAM, (2009)Voice of the Customers: Mining Online Customer Reviews for Product Feature-based Ranking., , and . WOSN, USENIX Association, (2010)An algorithm for synthesis of large time-constrained heterogeneous adaptive systems., , and . ACM Trans. Design Autom. Electr. Syst., 6 (2): 207-225 (2001)