Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software-defined networking security: pros and cons., , , and . IEEE Commun. Mag., 53 (6-Supplement): 73-79 (2015)A design methodology for energy aware neural networks., , , , , and . IWCMC, page 1333-1340. IEEE, (2011)Peak shaving through optimal energy storage control for data centers., , , and . ICC, page 1-6. IEEE, (2016)An approach to measuring kernel energy in software applications., , and . ICEAC, page 1-6. IEEE, (2011)Release-time aware VM placement., , , and . GLOBECOM Workshops, page 122-126. IEEE, (2014)An Algorithm-Centric Energy-Aware Design Methodology., , , and . IEEE Trans. Very Large Scale Integr. Syst., 22 (11): 2431-2435 (2014)An energy-aware design methodology based on kernel optimisations., , , , , and . Int. J. Auton. Adapt. Commun. Syst., 7 (3): 271-294 (2014)Efficient Internet Mapping in the Presence of Network Load Balancers., , and . TrustCom, page 1706-1713. IEEE Computer Society, (2012)Energy-efficient cloud resource management., , , and . INFOCOM Workshops, page 386-391. IEEE, (2014)Online Assignment and Placement of Cloud Task Requests with Heterogeneous Requirements., , , and . GLOBECOM, page 1-6. IEEE, (2015)