Author of the publication

Service Matching and Collaboration for Electronic Commerce.

, , , , and . ISADS, page 169-175. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic LOD conversion system of tweet data associated with tourist spots., , , , , , and . GCCE, page 1-2. IEEE, (2016)A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud., , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 888-900. Springer, (2017)Performance evaluation on data management approach for multiple clouds using secret sharing scheme., , and . ICCE, page 471-473. IEEE, (2016)Dynamic Authentication Method Dependent on Surrounding Environment., , , and . GCCE, page 855-857. IEEE, (2018)Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines., , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 413-422. Springer, (2019)Communication Robot for Elderly Based on Robotic Process Automation., , , , , and . COMPSAC (2), page 251-256. IEEE, (2019)A Concept Proposal on Modeling of Security Fatigue Level., , , , , and . ACIT/CSII/BCD, page 29-34. IEEE, (2017)A Distributed Log Management Method using a Blockchain Scheme., , and . ICCE, page 1-3. IEEE, (2020)Considerations for Using DPDK in a Hypervisor Virtual Environment., and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 261-268. Springer, (2020)Utilizing obfuscation information in deep learning-based Android malware detection., and . COMPSAC, page 1321-1326. IEEE, (2021)