Author of the publication

Managing overloaded hosts for energy-efficiency in cloud data centers.

, , , , and . Clust. Comput., 24 (3): 2001-2015 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile., , and . ICITEE, page 144:1-144:5. ACM, (2019)Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing., , , and . IEEE Trans. Cloud Comput., 8 (4): 1108-1121 (2020)ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-order Optimization., , , , , , , and . CoRR, (2023)Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning., , , , and . Future Gener. Comput. Syst., (2022)SafeBox: A scheme for searching and sharing encrypted data in cloud applications., , , , , and . SPAC, page 648-653. IEEE, (2017)An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images., , , , , , and . Comput. Electr. Eng., (2021)Predicting Virtual Machine's Power via a RBF Neural Network., , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 370-381. Springer, (2016)ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-Order Optimization., , , , , , , and . AAAI, page 18363-18371. AAAI Press, (2024)An Implementation of Trusted Remote Attestation Oriented the IaaSCloud., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 194-202. Springer, (2012)VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries., , , , and . DSC, page 528-535. IEEE, (2019)