Author of the publication

A Hash-Based Naming Strategy for the Fog-to-Cloud Computing Paradigm.

, , , , and . Euro-Par Workshops, volume 10659 of Lecture Notes in Computer Science, page 316-324. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Minimum Coincidence Routing Approach in Wavelength-Routed Optical WDM Networks., , , , , , , , and . LANOMS, IEEE, (2009)A Beacon-assisted direction-aware scanning scheme for 802.11-based discovery in Fog-to-Cloud systems., , and . PIMRC, page 1-6. IEEE, (2018)Improving learning automata-based routing in Wireless Sensor Networks., , , , , and . GLOBECOM, page 171-176. IEEE, (2012)An Approach to a Fault Tolerance LISP Architecture., , , , , , and . WWIC, volume 6649 of Lecture Notes in Computer Science, page 338-349. Springer, (2011)What is a Fog Node A Tutorial on Current Concepts towards a Common Definition., , , , , , and . CoRR, (2016)Towards user-centric, switching cost-aware fog node selection strategies., , and . Future Gener. Comput. Syst., (2021)mF2C: The Evolution of Cloud Computing Towards an Open and Coordinated Ecosystem of Fogs and Clouds., , , , , , , , , and 1 other author(s). Euro-Par Workshops, volume 11997 of Lecture Notes in Computer Science, page 136-147. Springer, (2019)A Machine Learning IDS for Known and Unknown Anomalies., , , and . DRCN, page 1-5. IEEE, (2022)Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems., , , , , and . CIoT, page 1-7. IEEE, (2018)Data Preservation through Fog-to-Cloud (F2C) Data Management in Smart Cities., , , and . ICFEC, page 1-9. IEEE, (2018)