Author of the publication

Mobile user clustering in large time-scale data transfer scheduling.

, , , and . MobiSys, page 523-524. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local polynomial contrast binary patterns for face recognition., , , , , and . Neurocomputing, (2019)A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing., , , and . Clust. Comput., 19 (2): 647-662 (2016)Towards building a value co-creation circle in social commerce., , , , and . Comput. Hum. Behav., (2020)Trusted Storage Architecture for Machine Reasoning based on Blockchain., , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI., , and . HICSS, page 5574-5575. ScholarSpace, (2024)Managing Big Data for Firm Performance: a Configurational Approach., , , and . AMCIS, Association for Information Systems, (2015)Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement., , , and . IEEE Trans. Learn. Technol., 10 (4): 514-525 (2017)Scheduling Bursts Using Interval Graphs in Optical Burst Switching Networks., , and . GLOBECOM, page 1-6. IEEE, (2009)Big Data Analytics for New Product Success (Product Innovation)., , and . AMCIS, Association for Information Systems, (2018)Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning., , , , and . ICCSIE, page 247-254. ACM, (2023)