Author of the publication

Centralized Optical-Frequency-Comb-Based RF Carrier Generator for DWDM Fiber-Wireless Access Systems.

, , , , , , and . JOCN, 6 (1): 1-7 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A privacy threat model for identity verification based on facial recognition., and . Comput. Secur., (September 2023)Performance of a 60-GHz DCM-OFDM and BPSK-Impulse Ultra-Wideband System with Radio-Over-Fiber and Wireless Transmission Employing a Directly-Modulated VCSEL., , , , , , , and . IEEE J. Sel. Areas Commun., 29 (6): 1295-1303 (2011)Automatic provisioning of multi-tier applications in cloud computing environments.. J. Supercomput., 71 (6): 2221-2250 (2015)Using CloudSim to learn cloud computing architecture/system concepts in a graduate course., , and . ITiCSE, page 82-87. ACM, (2013)Using Simulation For Decision Making In Zero Latency Enterprise Projects., , and . ECMS, page 25-31. European Council for Modeling and Simulation, (2009)A Simulation Framework To Help In Lean Manufacturing Initiatives., , , and . ECMS, page 304-310. European Council for Modeling and Simulation, (2011)Dealing with Heterogeneity in Load Balancing Algorithms., , and . ISPDC, page 123-132. IEEE Computer Society, (2006)Resource Dissemination Policies on Grids., , and . OTM Workshops, volume 3292 of Lecture Notes in Computer Science, page 135-143. Springer, (2004)Designing HIPAOC: High Performance Architecture On Chip., and . SIES, page 233-236. IEEE, (2008)Edge-centric delegation of authorization for constrained devices in the Internet of Things., and . Comput. Commun., (2020)