Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture for Secure Generation and Verification of Electronic Coupons, , , and . Proceedings of USENIX Annual Technical Conference, Boston, USA, (2001)A Customizable Mediation Engine for Metrics Collection, Aggregation and Composition., and . NOMS, page 162-173. IEEE, (2006)Static Energy Reduction Techniques for Microprocessor Caches., , , , and . ICCD, page 276-283. IEEE Computer Society, (2001)Cardiac-induced cerebral pulsatility, brain structure, and cognition in middle and older-aged adults., , , , , , , , , and 3 other author(s). NeuroImage, (2021)Physical design and implementation of POWER8™ (P8) server class processor., , , and . MWSCAS, page 1-4. IEEE, (2015)Towards Automated Assessment of Organizational Cybersecurity Posture in Cloud., , , , , , , , and . COMAD/CODS, page 167-175. ACM, (2023)Usage Metering for Service-Oriented Grid Computing., , and . IJEBR, 2 (1): 78-106 (2006)Co-operative content adaptation framework: satisfying consumer and content creator in resource constrained browsing., , , , , , and . WWW (Companion Volume), page 221-222. International World Wide Web Conferences Steering Committee / ACM, (2013)Exploiting Rich Telecom Data for Increased Monetization of Telecom Application Stores., , , and . MDM, page 63-68. IEEE Computer Society, (2012)A Secure Framework for Continuous Compliance across Heterogeneous Policy Validation Points., , , , and . CLOUD, page 176-182. IEEE, (2024)