Author of the publication

Cost-based Virtual Machine Scheduling for Data-as-a-Service.

, , , , and . J. Univers. Comput. Sci., 29 (12): 1461-1481 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic dispersion graph based anomaly detection., , , and . SoICT, page 36-41. ACM, (2011)Approximate Data Analytics Systems.. Dresden University of Technology, Germany, (2018)LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing., , , , , , , , , and 33 other author(s). DATE, page 169-174. IEEE, (2020)SGX-PySpark: Secure Distributed Data Analytics., , , and . WWW, page 3564-3563. ACM, (2019)TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public Clouds., , and . CLOUD, page 1-12. IEEE, (2021)Communication patterns based detection of anomalous network traffic., , , and . ISI, page 185. IEEE, (2012)secureTF: A Secure TensorFlow Framework., , , , , and . Middleware, page 44-59. ACM, (2020)UniCrawl: A Practical Geographically Distributed Web Crawler., , , , , and . CLOUD, page 389-396. IEEE Computer Society, (2015)TICAL: Trusted and Integrity-protected Compilation of AppLications., , , , , , and . EDCC, page 25-32. IEEE, (2024)A practical approach for updating an integrity-enforced operating system., , and . Middleware, page 311-325. ACM, (2020)