Author of the publication

Using CloudSim to learn cloud computing architecture/system concepts in a graduate course.

, , and . ITiCSE, page 82-87. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android malware detection from Google Play meta-data: Selection of important features., , , and . CNS, page 701-702. IEEE, (2015)Dynamic Tasks Assignment for Real Heterogeneous Clusters., , and . PPAM, volume 3019 of Lecture Notes in Computer Science, page 888-895. Springer, (2003)Initiating Load Balancing Operations., , and . Euro-Par, volume 3648 of Lecture Notes in Computer Science, page 292-301. Springer, (2005)High level performance metrics for FPGA-based multiprocessor systems., , and . Perform. Evaluation, 67 (6): 417-431 (2010)Android Malware Pattern Recognition for Fraud Detection and Attribution: A Case Study., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Defining the entity transfer interoperability reference model for military applications., , , and . SpringSim, page 21. SCS/ACM, (2010)An automatic machine scaling solution for cloud systems., and . HiPC, page 1-10. IEEE Computer Society, (2012)POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach., , , and . ACM Conference on Computer and Communications Security, page 1778-1780. ACM, (2016)Designing HIPAOC: High Performance Architecture On Chip., and . SIES, page 233-236. IEEE, (2008)Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach., , , and . EISIC, page 7-14. IEEE, (2018)