Author of the publication

Allia: alliance-based service discovery for ad-hoc environments.

, , , and . Workshop Mobile Commerce, page 1-9. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether., , and . Clust. Comput., 4 (4): 343-354 (2001)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)Improving binary classification on text problems using differential word features., , , and . CIKM, page 2019-2024. ACM, (2009)Finding and Ranking Knowledge on the Semantic Web., , , , , and . ISWC, volume 3729 of Lecture Notes in Computer Science, page 156-170. Springer, (2005)Semantic Message Passing for Generating Linked Data from Tables., , and . ISWC (1), volume 8218 of Lecture Notes in Computer Science, page 363-378. Springer, (2013)Using Linked Data to Interpret Tables., , , and . COLD, volume 665 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data., , , and . IWSPA@CODASPY, page 35-45. ACM, (2022)A Policy Based Approach to Security for the Semantic Web., , and . ISWC, volume 2870 of Lecture Notes in Computer Science, page 402-418. Springer, (2003)NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion., , and . BigDataSecurity/HPSC/IDS, page 49-54. IEEE, (2020)Generating Linked Data by Inferring the Semantics of Tables., , and . VLDS, volume 880 of CEUR Workshop Proceedings, page 17-22. CEUR-WS.org, (2011)