Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SABER: An Infrastructure-Agnostic Benchmark Tool for Elasticity Evaluation on Cloud Foundry Based Platforms., , , , and . ICOIN, page 378-383. IEEE, (2020)Mobility-Aware Registry Migration for Containerized Applications on Edge Computing Infrastructures., , , , and . J. Netw. Comput. Appl., (2023)Thea - a QoS, Privacy, and Power-aware Algorithm for Placing Applications on Federated Edges., , , and . PDP, page 136-143. IEEE, (2023)Towards Optimizing the Edge-to-Cloud Continuum Resource Allocation., , , , , , and . CLOSER, page 90-99. SCITEPRESS, (2023)Multivariate Interpolation at the Edge to Infer Faulty IoT Sensor Metrics., , , , , , , , , and . CLOSER, page 280-287. SCITEPRESS, (2022)Performance and accuracy trade-off analysis of techniques for anomaly detection in IoT sensors., , , , and . ICOIN, page 486-491. IEEE, (2017)DigiNet: Scaling up Provisioning of Network Digital Twin., , , , , , , and . NetSoft, page 136-144. IEEE, (2024)Performance-Aware Energy-Efficient Processes Grouping for Embedded Platforms., , , , and . ISCC, page 940-945. IEEE, (2018)GAMED: Gamification-Based Assessment Methodology for Final Project Development., , , and . ICALT, page 359-361. IEEE, (2019)Evaluating Energy and Thermal Efficiency of Anomaly Detection Algorithms in Edge Devices., , , , , and . ICOIN, page 208-213. IEEE, (2020)