Author of the publication

Specification and enforcement of flexible security policy for active cooperation.

, , , , and . Inf. Sci., 179 (15): 2629-2642 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The shape coordinates system in visualization space., , , and . VINCI, page 18-21. ACM, (2012)Air pollution data visualization based on the shape of a tree., , , and . VINCI, page 115-116. ACM, (2013)A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment., , , , , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 120-131. Springer, (2017)A Reinforcement Learning Based Auto-Scaling Approach for SaaS Providers in Dynamic Cloud Environment, , , , , and . Mathematical Problems in Engineering, (2019)Silhouette Smoothing for Real-Time Rendering of Mesh Surfaces., , , , , and . IEEE Trans. Vis. Comput. Graph., 14 (3): 640-652 (2008)Secure Virtualization Environment Based on Advanced Memory Introspection., , , , and . Secur. Commun. Networks, (2018)A SaaSI: an approved architecture for SaaS service composition., , , and . Int. J. Comput. Appl. Technol., 38 (1/2/3): 163-171 (2010)Cross-device task interaction framework between the smart watch and the smart phone., , , , , and . Pers. Ubiquitous Comput., 25 (6): 1039-1049 (2021)Data Driven Avatars Roaming in Digital Museum., , , and . Int. J. Virtual Real., 8 (3): 13-18 (2009)Coherent Photon Mapping on the Intel MIC Architecture., , , , and . J. Comput. Sci. Technol., 30 (3): 519-527 (2015)