Author of the publication

Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs.

, , , , , and . ICDCS, page 625-634. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS-Aware Proactive Data Replication for Big Data Analytics in Edge Clouds., , , , , and . ICPP Workshops, page 26:1-26:10. ACM, (2019)Capacitated cloudlet placements in Wireless Metropolitan Area Networks., , , , and . LCN, page 570-578. IEEE Computer Society, (2015)Throughput maximization and resource optimization in NFV-enabled networks., , , and . ICC, page 1-7. IEEE, (2017)Maximizing Sensor Lifetime in a Rechargeable Sensor Network via Partial Energy Charging on Sensors., , , and . SECON, page 1-9. IEEE, (2016)Enabling Age-Aware Big Data Analytics in Serverless Edge Clouds., , , and . INFOCOM, page 1-10. IEEE, (2023)A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks., , , , , and . Int. J. Distributed Sens. Networks, (2011)QoS-Aware Task Offloading in Distributed Cloudlets with Virtual Network Function Services., , and . MSWiM, page 109-116. ACM, (2017)Network Lifetime Maximization in Delay-Tolerant Sensor Networks with a Mobile Sink., , and . DCOSS, page 9-16. IEEE Computer Society, (2012)A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Action-Manipulation Attack and Defense to X-Armed Bandits., , , , and . TrustCom, page 1115-1122. IEEE, (2022)