Laercio Pioli
20  Ergebnisse:
Personensuche X
?
3

Recognition of Denial-of-Service Attacks in IoT Networks wi..:

, In: Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing,
 
?
4

Micro IDS: On-Line Recognition of Denial-of-Service Attacks..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
 
?
5

Matching Metadata on Blockchain for Self-Sovereign Identity:

, In: Business Process Management Workshops; Lecture Notes in Business Information Processing,
 
?
7

An Approach to Support the Design and the Dependability Ana..:

, In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Lecture Notes in Networks and Systems,
 
?
8

An Implementation Science Effort in a Heterogenous Edge Com..:

, In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Lecture Notes in Networks and Systems,
 
?
9

Characterization Research on I/O Improvements Targeting DIS..:

, In: IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society,
 
?
10

Research Characterization on I/O Improvements of Storage En..:

, In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Lecture Notes in Networks and Systems,
 
?
14

Exploring Architectural Strategies for Mobility Experimenta..:

, In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,
 
?
15

A Cluster Formation Algorithm for Fog Architectures Based o..:

, In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing; Lecture Notes in Networks and Systems,
 
1-15