From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Minimizing Virtual Machine Migration Probability for Cloud Environments., , , , и . HPCC/EUC, стр. 1430-1436. IEEE, (2013)Support vector machine approach for virtual machine migration in cloud data center., , , , и . Multimedia Tools Appl., 74 (10): 3419-3440 (2015)Effect of Augmented Reality on Astronomical Observation Instruction., , , , и . ICITL, том 11937 из Lecture Notes in Computer Science, стр. 184-193. Springer, (2019)A novel secure localization scheme against collaborative collusion in wireless sensor networks., , , , и . IWCMC, стр. 308-313. IEEE, (2011)Correlated utility-based pattern mining., , , , и . Inf. Sci., (2019)Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics., , и . Multim. Syst., 17 (4): 341-349 (2011)IoT-IMS Communication Platform for Future Internet., , , , , , и . Int. J. Adapt. Resilient Auton. Syst., 2 (4): 74-94 (2011)A channel assignment scheme for SCM/WDM-based personal communication network., , и . Wirel. Commun. Mob. Comput., 1 (4): 407-417 (2001)On delay constrained CAC scheme and scheduling policy for CBR traffic in IEEE 802.11e wireless LANs., , , и . Wirel. Commun. Mob. Comput., 10 (11): 1509-1520 (2010)Controlled deployments for wireless sensor networks., , , и . IET Commun., 3 (5): 820-829 (2009)