From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Personalized Fair Reputation Based Resource Allocation in Grid., , , и . ADVIS, том 4243 из Lecture Notes in Computer Science, стр. 408-417. Springer, (2006)Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm., , , и . Future Gener. Comput. Syst., 27 (8): 1124-1134 (2011)A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability., , и . ISPA, том 3358 из Lecture Notes in Computer Science, стр. 399-409. Springer, (2004)A Routing Optimization Algorithm for BGP Egress Selection., , , и . ICDCIT, том 4317 из Lecture Notes in Computer Science, стр. 192-199. Springer, (2006)iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency., , и . SIGCOMM Posters and Demos, стр. 166-168. ACM, (2019)A Scalable Approach to Full Attack Graphs Generation., , и . ESSoS, том 5429 из Lecture Notes in Computer Science, стр. 150-163. Springer, (2009)Efficient DVFS to Prevent Hard Faults for Many-Core Architectures., , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 674-679. Springer, (2014)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , и . ICT-EurAsia, том 7804 из Lecture Notes in Computer Science, стр. 271-284. Springer, (2013)Using Split Queues to Improve the Performance of Parallel Switch., , , и . APPT, том 2834 из Lecture Notes in Computer Science, стр. 3-11. Springer, (2003)Security evaluation of MISTY structure with SPN round function., , , и . Comput. Math. Appl., 65 (9): 1264-1279 (2013)