Author of the publication

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.

, , , , and . IoTBD, page 243-254. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust circularly orthogonal moment based on Chebyshev rational function., , , and . Digit. Signal Process., (2017)Multi-depth Graph Convolutional Networks for Fake News Detection., , , , and . NLPCC (1), volume 11838 of Lecture Notes in Computer Science, page 698-710. Springer, (2019)Repetitive process based higher-order iterative learning control law design., , and . ACC, page 378-383. IEEE, (2016)Training spiking neural networks with the improved Grey-Level Co-occurrence Matrix algorithm for texture analysis., , , and . ICNC, page 1069-1074. IEEE, (2015)Using Question Classification to Model User Intentions of Different Levels., , , , and . SMC, page 1153-1158. IEEE, (2009)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)Dynamic Attribute-Based Access Control in Cloud Storage Systems., , , , , and . Trustcom/BigDataSE/ISPA, page 129-137. IEEE, (2016)Low-cost wireless phase calibration that works on COTS RFID systems: poster., , , , , and . MobiCom, page 439-440. ACM, (2016)Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing., , , , and . IoTBD, page 243-254. SciTePress, (2016)Using Risk Dominance Strategy in Poker., , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)