Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Community and Role Detection in Information Networks., , , , , and . SDM, page 72-80. SIAM, (2016)Understanding Internet Video sharing site workload: A view from data center design., , , , , and . J. Vis. Commun. Image Represent., 21 (2): 129-138 (2010)Adaptive Sensor Placement and Boundary Estimation for Monitoring Mass Objects., , and . IEEE Trans. Syst. Man Cybern. Part B, 38 (1): 222-232 (2008)Untangling mixed information to calibrate resource utilization in virtual machines., , , , , and . ICAC, page 151-160. ACM, (2011)Matching Conflicts: Functional Validation of Agents, and . AAAI Workshop of Agent Conflicts, page 14--19. Orlando, Florida, AAAI Press, (July 1999)Enabling Information Confidentiality in Publish/Subscribe Overlay Services., , , , , and . ICC, page 5624-5628. IEEE, (2008)State space exploration using feedback constraint generation and Monte-Carlo sampling., , , and . ESEC/SIGSOFT FSE, page 321-330. ACM, (2007)Network-aware coordination of virtual machine migrations in enterprise data centers and clouds., , , and . IM, page 888-891. IEEE, (2013)Fault Detection in Distributed Systems by Representative Subspace Mapping., , and . ICPR (4), page 912-915. IEEE Computer Society, (2006)Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems., , , and . ICDCS, page 623-630. IEEE Computer Society, (2009)