Author of the publication

Efficient consolidation-aware VCPU scheduling on multicore virtualization platform.

, , , , , , and . Future Gener. Comput. Syst., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CredFinder: A real-time tweets credibility assessing system., , , , and . ASONAM, page 1406-1409. IEEE Computer Society, (2016)Toward Efficient Packet Buffering and Congestion Control Approaches for Reliable Data Delivery in Mobile Ad Hoc Network., , and . IDCS, volume 8223 of Lecture Notes in Computer Science, page 65-77. Springer, (2013)A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing., , , and . FGIT-GDC, volume 63 of Communications in Computer and Information Science, page 57-64. Springer, (2009)iRobot-Factory: An intelligent robot factory based on cognitive manufacturing and edge computing., , , , and . Future Gener. Comput. Syst., (2019)An efficient event matching system for semantic smart data in the Internet of Things (IoT) environment., , , and . Future Gener. Comput. Syst., (2019)ASA: Against statistical attacks for privacy-aware users in Location Based Service., , , , and . Future Gener. Comput. Syst., (2017)A lightweight machine learning-based authentication framework for smart IoT devices., , , , , and . Inf. Sci., (2019)Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model., , , and . IEEE Trans. Ind. Informatics, 16 (9): 6154-6162 (2020)Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA., , , , and . IEEE Access, (2020)Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach., , , and . IEEE Access, (2020)