From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks., и . IET Inf. Secur., 4 (4): 333-343 (2010)An Analytical Model for Estimating Cloud Resources of Elastic Services., , и . J. Netw. Syst. Manag., 24 (2): 285-308 (2016)Blockchain for drug traceability: Architectures and open challenges., , , , и . Health Informatics J., 27 (2): 146045822110112 (2021)An analytical simulator for deploying IP telephony., , , и . Int. J. Netw. Manag., 19 (1): 25-37 (2009)CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds., , , , , и . IEEE Trans. Serv. Comput., 16 (2): 1023-1038 (марта 2023)Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP., и . J. Univers. Comput. Sci., 16 (21): 3299-3313 (2010)Performance analysis of multi-core VMs hosting cloud SaaS applications., и . Comput. Stand. Interfaces, (2018)Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme., и . Comput. Commun., 32 (1): 179-188 (2009)Modeling and analysis of PC-based software routers.. Comput. Commun., 33 (12): 1462-1470 (2010)Performance analysis and comparison of interrupt-handling schemes in gigabit networks., , и . Comput. Commun., 30 (17): 3425-3441 (2007)