Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safari: Function-level power analysis using automatic instrumentation., , , , and . ICEAC, page 1-6. IEEE, (2012)Reinforcement Learning for Adaptive Video Compressive Sensing., , , and . CoRR, (2021)Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks., , , and . CoRR, (2012)Using Cobots, Virtual Worlds, and Edge Intelligence to Support On-line Learning., , , , and . HCI (42), volume 13096 of Lecture Notes in Computer Science, page 373-386. Springer, (2021)TRECON: A Framework for Enforcing Trusted ISP Peering., and . ICCCN, page 383-389. IEEE, (2006)A Case for Adaptive Resource Management in Alibaba Datacenter Using Neural Networks., , , , , , , , and . J. Comput. Sci. Technol., 35 (1): 209-220 (2020)The Emergence of Vehicle Computing., , and . IEEE Internet Comput., 25 (3): 18-22 (2021)Adaptive Secure Access to Remote Services in Mobile Environments., , and . IEEE Trans. Serv. Comput., 1 (1): 49-61 (2008)Privacy preserving shortest path routing with an application to navigation., , and . Pervasive Mob. Comput., (2014)Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing., , , , , and . IEEE Trans. Wirel. Commun., 22 (12): 8751-8765 (December 2023)