Author of the publication

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.

, , , , , , , and . Future Gener. Comput. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information., and . CAINE, page 208-213. ISCA, (2010)Block Identifications for Minimising Inter-Block Discontinuity in MPEG-1 Video Coded Images Using Statistical Inference., and . CAINE, page 189-192. ISCA, (2001)Secure Object Tracking Protocol for the Internet of Things., , and . IEEE Internet of Things Journal, 3 (4): 544-553 (2016)Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction., , , and . FNSS, volume 1113 of Communications in Computer and Information Science, page 3-22. Springer, (2019)Ad-Hoc Framework for Efficient Network Security for Unmanned Aerial Vehicles (UAV)., and . FNSS, volume 1113 of Communications in Computer and Information Science, page 23-36. Springer, (2019)Efficiency Broadcast Base Safety Message BSM Through VANET Based on Transmit Packet Coding (TPC)., , , , and . LifeTech, page 383-387. IEEE, (2020)Scalable RFID security framework and protocol supporting Internet of Things., , and . Comput. Networks, (2014)RFID Tag Ownership Transfer Protocol for a Closed Loop System., , and . IIAI-AAI, page 575-579. IEEE Computer Society, (2014)Breast Cancer Recurrence Prediction Using Random Forest Model., , , , and . SCDM, volume 700 of Advances in Intelligent Systems and Computing, page 318-329. Springer, (2018)A Framework for eLearning with Social Media Using DRM., , , and . SNPD, page 229-234. IEEE Computer Society, (2011)