From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Task scheduling using edge computing system in smart city., , и . Int. J. Commun. Syst., (2021)Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks., , , и . Comput. Networks, (января 2024)Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption., , , , , и . IEEE Trans. Serv. Comput., 13 (6): 1034-1044 (2020)Stochastic Computation Offloading and Scheduling Based on Mobile Edge Computing., , , , и . IEEE Access, (2019)A game-theoretic approach for channel security against active time-varying attacks based on artificial noise., , , и . J. Ambient Intell. Humaniz. Comput., 11 (6): 2215-2224 (2020)A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information., , , и . Int. Trans. Oper. Res., 28 (4): 1864-1889 (2021)Lossless Information Hiding in the VQ Index Table., , , и . J. Softw., 8 (3): 547-553 (2013)Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving., , , , , и . Appl. Math. Comput., (2020)(t, n) Threshold secret image sharing scheme with adversary structure., , , , и . Multim. Tools Appl., 76 (20): 21193-21210 (2017)A hierarchical combinatorial testing method for smart phone software in wearable IoT systems., , , , и . Comput. Electr. Eng., (2017)