Author of the publication

Reinforcement Learning based Cloud and Edge Resource Allocation for Real-Time Telemedicine.

, , , , , , and . ISMICT, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pervasive emotion computing: Conceptualization and implementation on emotion-aware digital movie guide service., , and . CCECE, page 767-772. IEEE, (2011)Scalable Star-Topology Server-Array Based P2P Overlay Network Testbed., , and . TRIDENTCOM, volume 90 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 172-179. Springer, (2011)Secure Virtual Private LAN Services: An overview with performance evaluation., , , and . ICC Workshops, page 2231-2237. IEEE, (2015)Secure hierarchical Virtual Private LAN Services for provider provisioned networks., , and . CNS, page 233-241. IEEE, (2013)Energy consumption model for mobile devices in 3G and WLAN networks., , and . CCNC, page 532-537. IEEE, (2012)ADHT: Agent-based DHT architecture for constrained devices., , , and . GLOBECOM, page 2763-2769. IEEE, (2014)Secure Keying Scheme for Network Slicing in 5G Architecture., , , , and . CSCN, page 1-6. IEEE, (2019)Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2783-2803 (September 2023)Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs., , , , , and . CoRR, (2018)Leveraging LTE security with SDN and NFV., , , , , and . ICIIS, page 220-225. IEEE, (2015)