Author of the publication

Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.

, , , , , , and . CCGRID, page 440-449. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forming Groups of Mobile Learners that Promote Collaborative Learning Supported by Mobile Devices., , , and . InterSol/CNRIA, volume 204 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 56-65. Springer, (2017)A Hierarchical Method for Dynamic Job Execution in NREN-based Cloud Systems., , and . NISS, page 38:1-38:6. ACM, (2019)Enhancing Moodle for offline learning in a degraded connectivity environment., , and . ICMCS, page 858-863. IEEE, (2012)A model of computer support to mobile learning in the senegalese educational system., , , and . GSCIT, page 1-6. IEEE, (2015)Using a Token Approach for the MAC Layer of Linear Sensor Networks - Impact of the Redundancy on the Throughput., , , and . SENSORNETS, page 122-129. SciTePress, (2015)Mechanism for multi-domain marking in DiffServ architecture., , and . ISCC, page 15-20. IEEE Computer Society, (2002)Using a token approach for the MAC layer of linear sensor networks: Impact of the node position on the packet delivery., , , and . Wireless Days, page 1-4. IEEE, (2014)Robust discovery, addressing and routing protocol for dynamic linear network., , , and . ISWCS, page 140-145. IEEE, (2017)Automatic discovery of topologies and addressing for Linear wireless sensors networks., , , and . Wireless Days, page 1-7. IEEE, (2012)New Node Distributed Access Control Scheme for Wireless Sensor Network., , and . ICIST, page 26:1-26:4. ACM, (2019)