Author of the publication

The Architecture of Traffic Information Grid.

, , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 209-212. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-DLS: Dynamic trusted scheduling for Cloud computing., , , and . Expert Syst. Appl., 39 (3): 2321-2329 (2012)Towards reliable self-clustering Mobile Ad Hoc Networks., , , , and . Comput. Electr. Eng., 38 (3): 551-562 (2012)Scheduling and Executing Heterogeneous Task Graph in Grid Computing Environment., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 474-479. Springer, (2005)Reachability Analysis of Cost-Reward Timed Automata for Energy Efficiency Scheduling., , , , , and . PMAM, page 140. ACM, (2014)A Process Algebraic Approach to Modeling Collective Behaviors in Social Networks., , and . SKG, page 62-67. IEEE Computer Society, (2007)Energy analysis for an executable program on a single computer based on BP neural network., , and . J. Exp. Theor. Artif. Intell., 25 (1): 105-117 (2013)Using evidence based content trust model for spam detection., , and . Expert Syst. Appl., 37 (8): 5599-5606 (2010)The Granularity Analysis of MPI Parallel Programs., and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 192-195. Springer, (2003)A Trust-Oriented Heuristic Scheduling Algorithm for Grid Computing., , , and . PaCT, volume 4671 of Lecture Notes in Computer Science, page 608-614. Springer, (2007)A Novel Approach to Select High-Reward Data Items in Big Data Stream Based on Multiarmed Bandit., and . IEEE Trans. Comput. Soc. Syst., 9 (4): 1144-1153 (2022)