Author of the publication

Dynamic trust evaluation and scheduling framework for cloud computing.

, , , and . Secur. Commun. Networks, 5 (3): 311-318 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis Method of Energy for C Source Program and Its Application., , , and . GreenCom/iThings/CPScom, page 1397-1402. IEEE, (2013)An evidence-based iterative content trust algorithm for the credibility of online news., and . Concurr. Comput. Pract. Exp., 21 (15): 1857-1881 (2009)Software Evolution Rules with Condition Constrains to Support Component Type Matching Based on Bigraph., , and . International Journal of Software Engineering and Knowledge Engineering, 28 (10): 1429-1453 (2018)Attribute Delegation Authorization Based on Subjective Trust Evaluation., , and . NPC Workshops, page 42-49. IEEE Computer Society, (2008)Trusted Dynamic Scheduling for Large-Scale Parallel Distributed Systems., and . ICPP Workshops, page 137-144. IEEE Computer Society, (2011)A Semantic Reputation Mechanism in P2P Semantic Web., , and . ASWC, volume 4185 of Lecture Notes in Computer Science, page 682-688. Springer, (2006)Trusted Transmission Protocol for Content Security., , and . ICYCS, page 1951-1956. IEEE Computer Society, (2008)Adaptation of Mismatching Services Based on Labelled Interface Automata., and . SKG, page 326-329. IEEE Computer Society, (2009)A Grid Resource Price-adjusting Strategy Based on Price Influence Model., , and . GCC, page 311-318. IEEE Computer Society, (2006)Energy analysis for an executable program on a single computer based on BP neural network., , and . J. Exp. Theor. Artif. Intell., 25 (1): 105-117 (2013)