Author of the publication

Similarity calculation method for user-define functions to detect malware variants.

, , , , , and . RACS, page 236-241. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Node selection for a fault-tolerant streaming service on a peer-to-peer network., , and . ICME, page 117-120. IEEE Computer Society, (2003)SSD Characterization: From Energy Consumption's Perspective., , , , , and . HotStorage, USENIX Association, (2011)Harmonic data placement: file system support for scalable streaming., , and . MMM, IEEE, (2006)Collective Intelligence-Based Web Page Search: Combining Folksonomy and Link-Based Ranking Strategy., , , , and . CIT (2), page 166-171. IEEE Computer Society, (2009)978-0-7695-3836-5.Statistical Admission Control for Real-Time VOD Servers., and . SAC (2), page 579-584. ACM, (2000)1-58113-240-9.Adaptive delay-based congestion control for high bandwidth-delay product networks., , , , and . INFOCOM, page 2885-2893. IEEE, (2011)DEMETER: hardware-assisted database checkpointing., , , , , , and . SAC, page 394-403. ACM, (2020)LIRS-WSR: Integration of LIRS and Writes Sequence Reordering for Flash Memory., , , , , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 224-237. Springer, (2007)Feasibility of the Computation Task Offloading to GPGPU-enabled Devices in Mobile Cloud., , , , and . ICCAC, page 244-251. IEEE Computer Society, (2015)Deduplication in SSDs: Model and quantitative analysis., , , , , , , , , and . MSST, page 1-12. IEEE Computer Society, (2012)