Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient SSD Integrity Verification Program Based on Combinatorial Group Theory., , and . Int. J. Interdiscip. Telecommun. Netw., 7 (1): 72-79 (2015)DERL3 functions as a tumor suppressor in gastric cancer., , , , , , , and . Comput. Biol. Chem., (2020)SDN-Based Big Data Caching in ISP Networks., , , , , and . IEEE Trans. Big Data, 4 (3): 356-367 (2018)Modeling and Analysis of Handover Algorithms., , , and . GLOBECOM, page 4473-4477. IEEE, (2007)Automatic data aggregation for recursively modeled NFV services., , and . Int. J. Netw. Manag., (2018)NFV service dynamicity with a DevOps approach., , , , , , , , , and 1 other author(s). IM, page 865-866. IEEE, (2017)A Qualitative Evaluation of Service Mesh-based Traffic Management for Mobile Edge Cloud., , , , , and . CCGRID, page 210-219. IEEE, (2022)Dynamic and User-Centric Network Selection in Heterogeneous Networks., , , and . IPCCC, page 538-544. IEEE Computer Society, (2007)A Virtualized LoRa Testbed and Experimental Results for Resource Pooling., , , , and . WF-IoT, page 871-876. IEEE, (2021)WeChat traffic profile and impact on mobile networks., , and . ICCC, page 334-338. IEEE, (2014)