Author of the publication

A profiling based task scheduling approach for multicore network processors.

, , , and . Concurr. Comput. Pract. Exp., 27 (4): 855-869 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multiple-Key Management Scheme in Wireless Sensor Networks., , , , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 337-344. Springer, (2013)A Structure P2P Based Web Services Registry with Access and Control., , , , and . CD-ARES, volume 8708 of Lecture Notes in Computer Science, page 286-297. Springer, (2014)Security of 5G-V2X: Technologies, Standardization and Research Directions., , and . CoRR, (2019)A Design of Web Log Integration Framework Using NoSQL., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 438-445. Springer, (2014)Editorial.. JoWUA, 1 (1): 1-2 (2010)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , and . INFOCOM Workshops, page 970-975. IEEE, (2016)Prosperity of IT security technologies in homeland defense., , and . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , and . IMIS, page 287-290. IEEE Computer Society, (2014)Trustworthy Opportunistic Access to the Internet of Services., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 469-478. Springer, (2013)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)