Author of the publication

A Comparative Study of Replica Placement Strategies in Data Grids.

, , , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 135-143. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Technology in Training Micro Businesses: Users' Requirements and Architectural Design., and . Int. J. ICT Res. Afr. Middle East, 5 (2): 14-24 (2016)Using Nature to Best Clarify Computer Security and Threats., and . DASC, page 702-707. IEEE Computer Society, (2009)A Two-way Strategy for Replica Placement in Data Grid., , , and . GCA, page 107-112. CSREA Press, (2008)Mobile Phone: A Loan Monitoring Tool for Micro Businesses., and . Int. J. ICT Res. Afr. Middle East, 7 (2): 48-66 (2018)An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)., , and . PM2HW2N, page 81-83. ACM, (2007)End user Authentication (EUA)., , and . WEBIST (1), page 406-409. INSTICC Press, (2007)A viewpoint of Tanzania e-commerce and implementation barriers., , and . Comput. Sci. Inf. Syst., 10 (1): 263-281 (2013)A Comparative Study of Replica Placement Strategies in Data Grids., , , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 135-143. Springer, (2007)Language based information routing security: policy enforcement., , and . Int. Arab J. Inf. Technol., 6 (1): 91-98 (2009)QoS as Means of Providing WSNs Security., , , and . ICN, page 66-71. IEEE Computer Society, (2008)