Author of the publication

A Performance Isolation Technique Ensuring SLA of Web Systems Having Primary-backup Web Switch.

, , and . IMSA, page 87-92. IASTED/ACTA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-Anonymization of the Bitcoin Network Using Address Clustering., , , , and . BlockSys, volume 1267 of Communications in Computer and Information Science, page 489-501. Springer, (2020)Bitcoin Double-Spending Attack Detection using Graph Neural Network., , and . ICBC, page 1-3. IEEE, (2023)DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains., , , and . ICBC, page 1-5. IEEE, (2022)A Performance Isolation Technique Ensuring SLA of Web Systems Having Primary-backup Web Switch., , and . IMSA, page 87-92. IASTED/ACTA Press, (2005)Towards Blockchain-based Stainless Steel Tracking., , , , and . APNOMS, page 318-321. IEEE, (2020)Amplitude based beat detection for atrial fibrillation in pacemaker., , , , and . EMBC, page 2757-2759. IEEE, (2016)Innovations in Blockchain for Crypto Assets and Exchanges., , , , and . Int. J. Netw. Manag., (July 2024)Design of Blockchain-based Travel Rule Compliance System., , , , , , and . ICBC, page 1-3. IEEE, (2022)CODE: Blockchain-based Travel Rule Compliance System., , , , , and . Blockchain, page 222-229. IEEE, (2022)Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural Network., , and . APNOMS, page 160-164. IEEE, (2023)