Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-line and unsupervised learning for codebook based visual recognition.. University of New South Wales, Sydney, Australia, (2011)base-search.net (ftunswworks:oai:unsworks.unsw.edu.au:1959.4/51513).Invited Paper: Improving Data Center Efficiency Through Holistic Scheduling In Kubernetes., , , , , , and . SOSE, IEEE, (2019)The Internet of Simulation: Enabling agile model based systems engineering for cyber-physical systems., , , , , and . SoSE, page 1-6. IEEE, (2017)A Service-Oriented Co-Simulation: Holistic Data Center Modelling Using Thermal, Power and Computational Simulations., , and . UCC, page 91-99. ACM, (2017)Budget-constrained Edge Service Provisioning with Demand Estimation via Bandit Learning., and . CoRR, (2019)Detecting Large Indels Using Optical Map Data., , and . RECOMB-CG, volume 11183 of Lecture Notes in Computer Science, page 108-127. Springer, (2018)The Effect of Resilient Supply Network on Enterprise Development and Implementation Strategy., and . LISS (1), page 215-220. SciTePress, (2011)Transmit Optimization for Symbol-Level Spoofing., , and . CoRR, (2016)Proactive Eavesdropping via Cognitive Jamming in Fading Channels., , and . CoRR, (2015)Joint Computation and Communication Cooperation for Mobile Edge Computing., , , , and . CoRR, (2017)