Author of the publication

An experimental methodology to evaluate energy efficiency and performance in an enterprise virtualized environment.

, , , , and . ICPE, page 51-62. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Better Replica Management for Hadoop Distributed File System., , , , and . BigData Congress, page 104-111. IEEE Computer Society, (2018)Can machine learning aid in delivering new use cases and scenarios in 5G?, , , , , , , , , and 7 other author(s). NOMS, page 1279-1284. IEEE, (2016)Machine learning as a service for enabling Internet of Things and People., , , and . Pers. Ubiquitous Comput., 20 (6): 899-914 (2016)Foundations for fairness in digital health apps., , , , , and . Frontiers Digit. Health, (2022)SCCD: Social Capital-Driven Career Development Framework., , , , and . ASONAM, page 1295-1298. IEEE Computer Society, (2018)Practical Performance Degradation Mitigation Solution Using Anomaly Detection for Carrier-Grade Software Networks., , , , , and . CSCN, page 1-6. IEEE, (2018)Spatio-Temporal Clustering Approach for Detecting Functional Regions in Cities., , , and . ICTAI, page 370-377. IEEE Computer Society, (2016)DeepAD: A Generic Framework Based on Deep Learning for Time Series Anomaly Detection., , and . PAKDD (1), volume 10937 of Lecture Notes in Computer Science, page 577-588. Springer, (2018)ADE: An ensemble approach for early Anomaly Detection., , and . IM, page 442-448. IEEE, (2017)Towards realistic sampling: generating dependencies in a relational database., , and . ICUIMC, page 12. ACM, (2013)