Author of the publication

An Online Mechanism for Purchasing IaaS Instances and Scheduling Pleasingly Parallel Jobs in Cloud Computing Environments.

, , , and . ICDCS, page 35-45. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pulmonary nodule risk classification in adenocarcinoma from CT images using deep CNN with scale transfer module., , , , , , , , , and 2 other author(s). IET Image Process., 14 (8): 1481-1489 (2020)Domain Adaptable Normalization for Semi-Supervised Action Recognition in the Dark., , , , , , and . CVPR Workshops, page 4250-4257. IEEE, (2022)Design of Nested LDGM-LDPC Codes for Compress-and-Forward in Relay Channel, , , and . CoRR, (2010)Efficient Data Aggregation Method Based on Function Approximation and Characterization in UWSNs., , and . ICSPCC, page 1-6. IEEE, (2023)Automated Segmentation Based on Residual U-Net Model for MR Prostate Images., , and . CISP-BMEI, page 1-6. IEEE, (2018)A Truthful Mechanism for Scheduling and Pricing Pleasingly Parallel Jobs in a Service Cloud., , , and . ICWS, page 294-297. IEEE, (2018)An Online Mechanism for Purchasing IaaS Instances and Scheduling Pleasingly Parallel Jobs in Cloud Computing Environments., , , and . ICDCS, page 35-45. IEEE, (2019)An Online Cost Optimization Algorithm for IaaS Instance Releasing in Cloud Environments., , and . CCWC, page 463-469. IEEE, (2021)Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution., , , , , and . Quantum Inf. Process., 23 (2): 40 (February 2024)Real-Time Semantic Mapping of Visual SLAM Based on DCNN., , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 194-204. Springer, (2018)