Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Resource Usage Prediction-Based Energy-Aware Scheduling Algorithm for Instance-Intensive Cloud Workflows., , , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 626-642. Springer, (2018)Dynamic Virtual Machine Number Selection for Processing-Capacity Constrained Workflow Scheduling in Cloud Computing Environments., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 71-78. IEEE, (2019)Image encryption based on a single-round dictionary and chaotic sequences in cloud computing., , , and . Concurr. Comput. Pract. Exp., 33 (7): 1 (2021)Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications., , , , and . IEEE Trans. Ind. Informatics, 18 (10): 7009-7018 (2022)A Numerical Splitting and Adaptive Privacy Budget-Allocation-Based LDP Mechanism for Privacy Preservation in Blockchain-Powered IoT., , , , , and . IEEE Internet Things J., 10 (8, April 15): 6733-6741 (2023)Differential privacy in blockchain technology: A futuristic approach., , and . J. Parallel Distributed Comput., (2020)Hybrid many-objective cuckoo search algorithm with Lévy and exponential distributions., , , , , and . Memetic Comput., 12 (3): 251-265 (2020)A traffic hotline discovery method over cloud of things using big taxi GPS data., , , , and . Softw. Pract. Exp., 47 (3): 361-377 (2017)Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud Workflows., , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 590-596. IEEE, (2018)Flexible Temporal Consistency for Fixed-Time Constraint Verification in Grid Workflow Systems., and . GCC, volume 3795 of Lecture Notes in Computer Science, page 300-311. Springer, (2005)