Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerant mutual exclusion algorithms., and . J. Syst. Softw., 11 (2): 111-129 (1990)The Timewheel Group Membership Protocol., , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 664-680. Springer, (1998)Teams: An Availability Management Service for a Timed Asynchronous Distributed System., and . Int. J. Comput. Their Appl., (2002)Interagent Communication and Synchronization Support in the DaAgent Mobile Agent-Based Computing System., and . IEEE Trans. Parallel Distributed Syst., 14 (3): 290-306 (2003)MapReduce System over Heterogeneous Mobile Devices., , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 168-179. Springer, (2009)Identifying Differentiating Factors for Cyberbullying in Vine and Instagram., , , , and . SIMBig, volume 1410 of Communications in Computer and Information Science, page 348-361. Springer, (2020)Scalable and timely detection of cyberbullying in online social networks., , , , and . SAC, page 1738-1747. ACM, (2018)Incorporating Individual and Group Privacy Preferences in the Internet of Things., and . CoRR, (2021)Utilizing Microservices Architecture for Enhanced Service Sharing in IoT Edge Environments., and . IEEE Access, (2022)Batch Rekeying in Mykil Key Management System., , and . IASTED PDCS, page 607-612. IASTED/ACTA Press, (2005)