Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRECON: A Framework for Enforcing Trusted ISP Peering., and . ICCCN, page 383-389. IEEE, (2006)Adaptive Secure Access to Remote Services in Mobile Environments., , and . IEEE Trans. Serv. Comput., 1 (1): 49-61 (2008)Privacy preserving shortest path routing with an application to navigation., , and . Pervasive Mob. Comput., (2014)A Case for Adaptive Resource Management in Alibaba Datacenter Using Neural Networks., , , , , , , , and . J. Comput. Sci. Technol., 35 (1): 209-220 (2020)Safari: Function-level power analysis using automatic instrumentation., , , , and . ICEAC, page 1-6. IEEE, (2012)Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing., , , , , and . IEEE Trans. Wirel. Commun., 22 (12): 8751-8765 (December 2023)Reinforcement Learning for Adaptive Video Compressive Sensing., , , and . CoRR, (2021)The Emergence of Vehicle Computing., , and . IEEE Internet Comput., 25 (3): 18-22 (2021)Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks., , , and . CoRR, (2012)Using Cobots, Virtual Worlds, and Edge Intelligence to Support On-line Learning., , , , and . HCI (42), volume 13096 of Lecture Notes in Computer Science, page 373-386. Springer, (2021)