Author of the publication

Profit maximization resource allocation in cloud computing with performance guarantee.

, , , , , , and . IPCCC, page 1-2. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MCEN: Maximum cooperative equilibrium WSN based on greedy prediction to reduce opposite transmission., , , , and . Comput. Networks, (February 2023)Some insights into farfield wideband beamformers in the presence of microphone mismatches., and . ICASSP, page 331-335. IEEE, (2013)KPointer: Keep the code pointers on the stack point to the right code., , , , , and . Comput. Secur., (2022)Binding-Adaptive Diffusion Models for Structure-Based Drug Design., , , , , , , , and . AAAI, page 12671-12679. AAAI Press, (2024)Research on Robust Broadband Beamformers Using Low-Order Statistics of Microphone Mismatches., and . ICSPCC, page 1-5. IEEE, (2023)Information access across languages on the web: From search engines to digital libraries., and . ASIST, volume 46 of Proc. Assoc. Inf. Sci. Technol., page 1-14. Wiley, (2009)Multistage Filtering for Collusion Detection in P2P Network., , and . DASC, page 911-916. IEEE Computer Society, (2011)Digital radio over fiber for LTE-advanced: Opportunities and challenges., , , , , , and . ONDM, page 194-199. IEEE, (2013)Robust farfield wideband beamformer design using worst-case performance optimization., , , and . APCCAS, page 583-586. IEEE, (2012)Vulnerability Evaluating Based on Attack Graph., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 555-563. Springer, (2012)