Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power consumption of virtual machines with network transactions: Measurement and improvements., , and . INFOCOM, page 1051-1059. IEEE, (2014)On GPU Pass-Through Performance for Cloud Gaming: Experiments and Analysis., and . NetGames, page 6:1-6:6. IEEE/ACM, (2013)Cloud Gaming: Understanding the Support From Advanced Virtualization and Hardware., , and . IEEE Trans. Circuits Syst. Video Techn., 25 (12): 2026-2037 (2015)On Multiple Virtual NICs in Cloud Computing: Performance Bottleneck and Enhancement., , , , and . IEEE Syst. J., 12 (3): 2417-2427 (2018)Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis., and . IEEE Syst. J., 7 (2): 335-345 (2013)Cloud gaming: architecture and performance., , , and . IEEE Netw., 27 (4): 1-0 (2013)Live Broadcast With Community Interactions: Bottlenecks and Optimizations., , , , and . IEEE Trans. Multim., 19 (6): 1184-1194 (2017)A Castle of Glass: Leaky IoT Appliances in Modern Smart Homes., , , and . IEEE Wirel. Commun., 25 (6): 32-37 (2018)Bootstrapping Trust in Distributed Systems with Blockchains., , , and . login Usenix Mag., (2016)Blockstack: A Global Naming and Storage System Secured by Blockchains., , , and . USENIX Annual Technical Conference, page 181-194. USENIX Association, (2016)