Author of the publication

Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis.

, , , , , , and . IEEE CLOUD, page 91-98. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1278-1287 (2012)Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts., , and . BWCCA, page 114-121. IEEE, (2012)Verification of Secret Key Generation from UWB Channel Observations., , , , and . ICC, page 1-5. IEEE, (2009)Robust adversarial learning and invariant measures., , and . PACRIM, page 529-535. IEEE, (2015)Time Correlation Analysis of Secret Key Generation via UWB Channels., , and . GLOBECOM, page 1-6. IEEE, (2010)Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions., and . TrustCom, page 664-672. IEEE Computer Society, (2011)On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs., , and . BWCCA, page 167-174. IEEE Computer Society, (2011)Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis., , , , , , and . IEEE CLOUD, page 91-98. IEEE Computer Society, (2010)Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments., , and . AINA, page 406-414. IEEE Computer Society, (2012)A Distributed Application-Level IT System Workload Generator., , and . AINA Workshops, page 1100-1105. IEEE Computer Society, (2009)