Author of the publication

Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme.

, , , and . ACIS-ICIS, page 35-41. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fair Service and Dynamic Round Robin scheduling scheme for CICQ switches., , , and . ICT, page 1-6. IEEE, (2008)Achieving Fair Service with a Layered Scheduling Scheme for CICQ Switches., , , and . ICDMA, page 137-142. IEEE Computer Society, (2011)Cushion: A proactive resource provisioning method to mitigate SLO violations for containerized microservices., , , , , and . IET Commun., 16 (17): 2105-2122 (2022)A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture., , , , , and . CyberC, page 50-53. IEEE, (2017)SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation., , , , and . Multim. Syst., 30 (4): 225 (August 2024)Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures., , , , , and . VTC Spring, page 1-5. IEEE, (2017)Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme., , , and . ACIS-ICIS, page 35-41. IEEE Computer Society, (2011)An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 410-415. IEEE, (2023)Superpoint-based detection against distributed denial of service (DDoS) flooding attacks., , , and . LANMAN, page 1-6. IEEE, (2015)A Diversity Metric Based Study on the Correlation between Diversity and Security., , , , , and . IEICE Trans. Inf. Syst., 102-D (10): 1993-2003 (2019)