Author of the publication

EffiView: Trigger-Based Monitoring Approach with Low Cost in SDN.

, , , and . HPCC/SmartCity/DSS, page 309-315. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personalized Fair Reputation Based Resource Allocation in Grid., , , and . ADVIS, volume 4243 of Lecture Notes in Computer Science, page 408-417. Springer, (2006)Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks., , and . ICC, page 6128-6132. IEEE, (2013)LDC: Detecting BGP Prefix Hijacking by Load Distribution Change., , and . IPDPS Workshops, page 1197-1203. IEEE Computer Society, (2012)Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks., , , , , , , and . MobiHoc, page 209-220. ACM, (2008)Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning., , and . TrustCom, page 922-926. IEEE Computer Society, (2011)A Location Management Algorithm for LEO Satellite Networks., , , , , and . TrustCom/ISPA/IUCC, page 1362-1366. IEEE Computer Society, (2013)A Distributed Routing Algorithm for LEO Satellite Networks., , , , , and . TrustCom/ISPA/IUCC, page 1367-1371. IEEE Computer Society, (2013)Authenticating with Attributes in Online Social Networks., , , , and . NBiS, page 607-611. IEEE Computer Society, (2011)Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast., , and . APSCC, page 179-186. IEEE Computer Society, (2007)Network Access Control Mechanism Based on Locator/Identifier Split., , and . NAS, page 171-174. IEEE Computer Society, (2009)