Author of the publication

Managing Configuration Complexity during Deployment and Maintenance of SOA Solutions.

, , and . IEEE SCC, page 152-159. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches., and . ICISSP, page 445-452. SCITEPRESS, (2022)Privacy-Aware Collaborative Spam Filtering, , and . IEEE Transactions on Parallel and Distributed Systems, 20 (5): 725-739 (2009)F4D: Factorized 4D Convolutional Neural Network for Efficient Video-Level Representation Learning., , and . ICAART (3), page 1002-1013. SCITEPRESS, (2024)Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition., , , , , , and . HEALTHINF, page 319-325. SciTePress, (2017)Techniques for efficient fragment detection in web pages., , , and . CIKM, page 516-519. ACM, (2003)Preface., , , and . CollaborateCom, ICST / IEEE, (2012)Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clusters., , and . CollaborateCom, page 55-63. ICST / IEEE, (2014)Universal Metadata Repository: Integrating Data Profiles Across an Organization., , , , , , and . IRI, page 452-459. IEEE, (2018)Toward Low-Cost and Sustainable IoT Systems for Soil Monitoring in Coastal Wetlands., , , , , , , and . CIC, page 52-61. IEEE, (2023)Privacy Vulnerabilities of Wearable Activity Monitors: Threat and Potential Defence., , and . CIC, page 105-116. IEEE, (2021)