Author of the publication

A Heuristic Time Sharing Policy for Backup Resources in Cloud System.

, , , and . KSII Trans. Internet Inf. Syst., 10 (7): 3026-3049 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An algorithm of pose estimation based on conic correspondences., , , and . ROBIO, page 314-319. IEEE, (2017)Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network., , , and . WISA, page 305-310. IEEE, (2017)Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services., , , , , and . IEEE Trans. Mob. Comput., 21 (2): 663-680 (2022)Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior., , , and . IMMS, page 84-95. ACM, (2023)Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators., , , and . NDSS, The Internet Society, (2022)A robust inference algorithm for crowd sourced categorization., , , , , and . ISKE, page 1-6. IEEE, (2017)Energy-Aware Scheduling Tasks on Chip Multiprocessor., , , and . ICNC (4), page 319-323. IEEE Computer Society, (2007)An Offset Algorithm for Conflict Resolution in Context-Aware Computing., , , , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 878-887. Springer, (2007)Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services., , , , and . ACM Great Lakes Symposium on VLSI, page 381-386. ACM, (2020)Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks., , , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 190-201. Springer, (2011)