Author of the publication

Building Web Services Middleware with Predictable Execution Times

, , and . World Wide Web, 15 (5-6): 685-744 (September 2012)
DOI: 10.1007/s11280-012-0160-x

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cost Based Coordination Model for Long Running Transactions in Web Services., , and . iiWAS, volume 196 of books@ocg.at, page 97-108. Austrian Computer Society, (2005)APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control., , and . EuroPLoP, page 331-346. UVK - Universitaetsverlag Konstanz, (2001)Integration of Heterogeneous Web Service Components., and . WSMAI, page 87-94. INSTICC Press, (2004)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Privacy preserving distributed machine learning with federated learning., , , , and . Comput. Commun., (2021)Efficient privacy preservation of big data for accurate data mining., , , , and . Inf. Sci., (2020)PPaaS: Privacy Preservation as a Service., , , , and . CoRR, (2020)Authorization Control for a Semantic Data Repository through an Inference Policy Engine., , and . IEEE Trans. Dependable Secur. Comput., 10 (6): 328-340 (2013)Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol., , , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 558-576. Springer, (2007)Working Group Report on Information Infrastructure for Global and Virtual Enterprises., , , and . WETICE, page 62-67. IEEE Computer Society, (1997)