Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative evaluation of semantic web service discovery approaches., , , , and . iiWAS, page 33-39. ACM, (2010)A comparative evaluation of state-of-the-art web service composition testing approaches., , , and . AST, page 29-35. ACM, (2011)An effective access control approach to support web service security., , , and . iiWAS, page 529-535. ACM, (2009)An evaluation of process mediation approaches in web services., , , , and . iiWAS, page 48-55. ACM, (2010)An evaluation of state-of-the-art approaches for web service selection., , , , , and . iiWAS, page 885-889. ACM, (2010)Semantic Web Service Discovery and Composition Based on AI Planning and Web Service Modeling Ontology., , and . APSCC, page 397-403. IEEE Computer Society, (2008)A Comparative Evaluation of State-of-the-Art Approaches for Web Service Composition., , and . ICSEA, page 488-493. IEEE Computer Society, (2008)Security conscious AI-planning-based composition of semantic web services., , , , and . IJWIS, 6 (3): 203-229 (2010)Security conscious composition of Semantic Web services based on AI planning and description logic., , , , and . iiWAS, page 536-542. ACM, (2009)SCAIMO - A Case for Enabling Security in Semantic Web Service Composition., , , , and . FGIT-GDC, volume 63 of Communications in Computer and Information Science, page 65-72. Springer, (2009)