Author of the publication

Relative weight comparison between virtual key factors of cloud computing with analytic network process.

, , , , and . J. Supercomput., 72 (5): 1694-1714 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of enhanced evoked potentials using wavelet filtering., , , and . Multimedia Tools Appl., 63 (1): 45-61 (2013)Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing., and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 249-254. Springer, (2015)A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform., , and . Sensors, 16 (7): 1036 (2016)Human-centric storage resource mechanism for big data on cloud service architecture., , and . J. Supercomput., 72 (7): 2437-2452 (2016)Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure., , and . Neurocomputing, (2018)Special issue of computers and mathematics with applications on Ädvances in cryptography, security and applications for future computer science"., , , and . Comput. Math. Appl., 60 (2): 175 (2010)A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment., , , , and . Sensors, 22 (16): 6133 (2022)Algorithms, Processes, and Frameworks for User-oriented Applications., and . J. Inf. Process. Syst., 14 (4): 801-806 (2018)Algorithms, Processes, and Services for Future ICT., and . J. Inf. Process. Syst., 16 (6): 1231-1237 (2020)HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet., , and . J. Inf. Process. Syst., 12 (3): 489-501 (2016)