Author of the publication

NORA: Network Oriented Resource Allocation for Data Intensive Applications in the Cloud Environment.

, , , , and . CSCWD, page 295-300. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transaction-Oriented Engineering Design and Formal Specification: a Multi-Agent Approach., , , , and . Transactions of the SDPS, 7 (2): 57-70 (2003)Automatic Topic Discovery and Categorisation of Hidden Web Databases., , and . BNCOD Posters, page 39-42. aka / IOS Press / infix, (2003)An Investigation of User Behaviour Consistency for Context-Aware Information Retrieval Systems., , , and . Int. J. Adv. Pervasive Ubiquitous Comput., 1 (4): 69-90 (2009)A multi-user location-awareness system., , , and . CSCWD, page 53-58. IEEE, (2010)Agent based facilitator assistant for virtual meetings., , and . CSCWD, page 335-341. IEEE, (2011)NORA: Network Oriented Resource Allocation for Data Intensive Applications in the Cloud Environment., , , , and . CSCWD, page 295-300. IEEE, (2014)Processing Data Structures in a Peer-To-Peer Network., , and . CSCWD, page 136-140. IEEE, (2006)An ant based multi constraints QoS aware service selection algorithm in Wireless Mesh Networks., , , and . Simul. Model. Pract. Theory, 19 (9): 1933-1945 (2011)A Sentinel Based Exception Diagnosis in Market Based Multi-Agent Systems., , , , and . DEECS, volume 4055 of Lecture Notes in Computer Science, page 258-267. Springer, (2006)Monitoring for Slow Suspicious Activities Using a Target Centric Approach., , , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 163-168. Springer, (2013)