Author of the publication

Security and Performance in Network Component Architecture.

, , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 1055-1058. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rating prediction using review texts with underlying sentiments., , and . Inf. Process. Lett., (2017)Filtering Out Noise Logs for Process Modelling Based on Event Dependency., , , , and . ICWS, page 388-392. IEEE, (2019)Balanced scheduling of distributed workflow tasks based on clustering., , , , , and . Knowl. Based Syst., (2020)Automatic Web service composition driven by keyword query., , , , and . World Wide Web, 23 (3): 1665-1692 (2020)Web service recommendation for mashup creation based on graph network., , , and . J. Supercomput., 79 (8): 8993-9020 (May 2023)Graph-Based Attentive Sequential Model With Metadata for Music Recommendation., , , , and . IEEE Access, (2022)Profit maximization for security-aware task offloading in edge-cloud environment., , , , , and . J. Parallel Distributed Comput., (2021)Long tail service recommendation based on cross-view and contrastive learning., , , and . Expert Syst. Appl., 238 (Part C): 121957 (March 2024)A systemic framework for crowdsourced test report quality assessment., , , , , , and . Empir. Softw. Eng., 25 (2): 1382-1418 (2020)An ensemble learning approach for software semantic clone detection., , , , , and . CoRR, (2020)