Author of the publication

Provider-level content migration strategies in P2P-based media distribution networks.

, , and . CCNC, page 337-341. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diagnose the mild cognitive impairment by constructing Bayesian network with missing data., , , , and . Expert Syst. Appl., 38 (1): 442-449 (2011)A new bandwidth-efficient multicast routing scheme for mobile Ad hoc Networks., , , and . WTS, page 1-7. IEEE, (2015)Revealing temporal features of attacks against smart grid., , , and . ISGT, page 1-6. IEEE, (2013)Synthetic Forgery Attack against Continuous Keystroke Authentication Systems., and . ICCCN, page 1-7. IEEE, (2018)Low-power carry select adder using fast all-one finding logic., , and . SoSE, page 1-5. IEEE, (2008)Bidirectional Range Extension for TCAM-Based Packet Classification., and . Networking, volume 6091 of Lecture Notes in Computer Science, page 351-361. Springer, (2010)Double Verifiably Encrypted Signature-Based Contract Signing Protocol., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 86-93. Springer, (2010)Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph., , , and . IEEE Trans. Parallel Distributed Syst., 25 (12): 3274-3284 (2014)Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 936-948 (2013)Mobility-Aware Service Caching in Mobile Edge Computing for Internet of Things., , and . Sensors, 20 (3): 610 (2020)