Author of the publication

Performance Exploration for high Performance Simulation in Lightweight-Virtualization-Based Cloud.

, , , , , and . ISCID (2), page 17-21. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intelligent scheduling algorithm for complex manufacturing system simulation with frequent synchronizations in a cloud environment., , , , , and . Memetic Comput., 11 (4): 357-370 (2019)IRAD: Implicit Representation-driven Image Resampling against Adversarial Attacks., , , , , and . CoRR, (2023)CaBaFL: Asynchronous Federated Learning via Hierarchical Cache and Feature Balance., , , , , , , and . CoRR, (2024)Unveiling Project-Specific Bias in Neural Code Models., , , , , , , and . LREC/COLING, page 17205-17216. ELRA and ICCL, (2024)On the Robustness of Segment Anything., , , , , , , and . CoRR, (2023)ContainerVisor: Customized Control of Container Resources., , and . IC2E, page 190-199. IEEE, (2019)Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines., , , , , , , and . CLOUD, page 613-620. IEEE Computer Society, (2015)Security Analysis of Email Systems., , and . CSCloud, page 91-96. IEEE Computer Society, (2017)Learning to Locate and Describe Vulnerabilities., , , , and . ASE, page 332-344. IEEE, (2023)Understanding adversarial robustness via critical attacking route., , , , , and . Inf. Sci., (2021)