Author of the publication

A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security.

, , and . ICETET, page 346-351. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermal model for dc characteristics of algan/gan hemts including self-heating effect and non-linear polarization., and . Microelectron. J., 39 (10): 1181-1188 (2008)Actor-critic architecture based probabilistic meta-reinforcement learning for load balancing of controllers in software defined networks., , and . Autom. Softw. Eng., 29 (2): 59 (2022)A Fuzzy Deduction Graph Model for Computing with Words., , and . ICETET, page 121-128. IEEE Computer Society, (2011)Application Specific Performance Evaluation of Vertical Handoff in UMTS-WLAN Network., and . J. Interconnect. Networks, 18 (4): 1850013:1-1850013:18 (2018)Study of Reneging Behavior in Batched Multimedia Service., , and . AICCSA, page 806-813. IEEE Computer Society, (2006)Reliability analysis of Wireless Sensor Network., , and . ICON, page 1-6. IEEE, (2008)Survivability index for a GPRS network., and . ICON, page 1-4. IEEE, (2008)Stochastic Modeling and Performance Analysis for Video-On-Demand Systems., , and . IWDC, volume 3741 of Lecture Notes in Computer Science, page 493-499. Springer, (2005)Analysis of Queuing based Call Admission Control Scheme in CDMA Cellular Network for Variation in Mobility and Soft Handoff Threshold., and . ICIIS, page 1-6. IEEE, (2008)A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security., , and . ICETET, page 346-351. IEEE Computer Society, (2009)