Author of the publication

Adaptive Load Balancing Mechanism for Server Cluster.

, , , , , , , , , , , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 549-557. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Histogram-Based Transformation Function Estimation for Low-Light Image Enhancement., , , and . ICIP, page 1-5. IEEE, (2022)Adaptive Load Balancing Mechanism for Server Cluster., , , , , , , , , and 3 other author(s). ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 549-557. Springer, (2006)TM-Coin: Trustworthy management of TCB measurements in IoT., and . PerCom Workshops, page 654-659. IEEE, (2017)Software Mobility for Personalized Computing Environments on Removable Storages., , , , , , , , , and . CCNC, page 1261-1262. IEEE, (2008)A Quadratic Formulation of ESS Degradation and Optimal DC Microgrid Operation Strategy Using Quadratic Programming., , , , , , and . IEEE Access, (2024)Buffer Cache Level Encryption for Embedded Secure Operating System., , , , , and . EUC, volume 4808 of Lecture Notes in Computer Science, page 346-355. Springer, (2007)Optimal Control of Roll-Pitch Seeker with Singularity Avoidance., , , , , and . MED, page 915-920. IEEE, (2018)TAaaS: Trustworthy Authentication as a Service Based on Trusted Path., , , and . CLOUD, page 27-34. IEEE Computer Society, (2016)Circular Coordinates for Density-Robust Analysis., and . CoRR, (2023)A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag., , and . FGCN (1), page 436-441. IEEE Computer Society, (2007)