From post

The SAHARA Model for Service Composition across Multiple Providers

, , , , , , , , , , , , , , и . Proceedings of the First International Conference on Pervasive Computing, том 2414 из Lecture Notes in Computer Science, стр. 1--14. Zurich, Springer-Verlag, (августа 2002)Invited paper.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Countering kernel rootkits with lightweight hook protection., , , и . ACM Conference on Computer and Communications Security, стр. 545-554. ACM, (2009)Classification and Analysis of Human Body Movement Characteristics Associated with Acrophobia Induced by Virtual Reality Scenes of Heights., , , , , , и . Sensors, 23 (12): 5482 (2023)Gated Recurrent Unit Network for Psychological Stress Classification Using Electrocardiograms from Wearable Devices., , , , , и . Sensors, 22 (22): 8664 (2022)Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks., , и . ICNP, стр. 236. IEEE Computer Society, (2002)The SAHARA Model for Service Composition across Multiple Providers., , , , , , , , , и 11 other автор(ы). Pervasive, том 2414 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2002)GRIFFIN: Guarding Control Flows Using Intel Processor Trace., , и . ASPLOS, стр. 585-598. ACM, (2017)Secure in-VM monitoring using hardware virtualization., , , и . CCS, стр. 477-487. ACM, (2009)High-Resolution Side Channels for Untrusted Operating Systems., , и . USENIX Annual Technical Conference, стр. 299-312. USENIX Association, (2017)Protocol-Independent Adaptive Replay of Application Dialog., , , и . NDSS, The Internet Society, (2006)deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , и . ACM Conference on Computer and Communications Security, стр. 1205-1216. ACM, (2013)