Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Constraint Formulation for Minimum-Energy Multicast Routing in Wireless Multihop Ad-hoc Networks., and . Wireless Networks, 12 (1): 23-32 (2006)Delay and Capacity Trade-offs in Mobile Wireless Networks with Infrastructure Support., , , , and . J. Comput. Sci. Technol., 27 (2): 328-340 (2012)Context-Aware Multimedia Processing System in a Pervasive Environment., , , and . GLOBECOM, page 1-6. IEEE, (2009)Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network., , , , and . IEEE Trans. Computers, 64 (12): 3488-3499 (2015)Resilient information management system for disaster situations., , , , and . ICOIN, page 1-6. IEEE, (2017)Trusted Virtual Machine Model Based on High-Performance Cipher Coprocessor., , , and . ICPCSEE (1), volume 1257 of Communications in Computer and Information Science, page 705-715. Springer, (2020)Hare: Exploiting Inter-job and Intra-job Parallelism of Distributed Machine Learning on Heterogeneous GPUs., , , and . HPDC, page 253-264. ACM, (2022)SkyChain: A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System., , , , , and . ICPP, page 3:1-3:11. ACM, (2020)A general cloud firewall framework with dynamic resource allocation., , , and . ICC, page 1941-1945. IEEE, (2013)Machine-Learning-Based Online Distributed Denial-of-Service Attack Detection Using Spark Streaming., , , , , and . ICC, page 1-6. IEEE, (2018)