Author of the publication

A continuous double auction method for resource allocation in computational grids.

, , , , and . CISched, page 29-35. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information sharing vs. privacy: A game theoretic analysis., and . Expert Syst. Appl., (2017)Liveness Verification in TRSs Using Tree Automata and Termination Analysis., , and . Comput. Informatics, 29 (3): 407-426 (2010)A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware., , and . ISC Int. J. Inf. Secur., 15 (1): 59-71 (2023)SANT: Static Analysis of Native Threads for Security Vetting of Android Applications., and . ISC Int. J. Inf. Secur., 14 (1): 13-25 (2022)Adaptive cost-sensitive stance classification model for rumor detection in social networks., and . Soc. Netw. Anal. Min., 12 (1): 134 (2022)Interdependency Analysis in Security Investment against Strategic Attacks., and . Inf. Syst. Frontiers, 22 (1): 187-201 (2020)Benchmarking reputation systems: A quantitative verification approach., and . Comput. Hum. Behav., (2016)A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language., , and . ECOWS, page 203-212. IEEE Computer Society, (2007)Specification and Implementation of Multi-Agent Organizations., , , and . WEBIST (1), page 447-453. INSTICC Press, (2006)Comparing Negotiation Strategies Based on Offers., , and . DMBiz@PAKDD, volume 177 of Frontiers in Artificial Intelligence and Applications, page 87-98. IOS Press, (2007)