Author of the publication

An Efficient Elephant Flow Detection with Cost-Sensitive in SDN.

, , , , and . EAI Endorsed Trans. Ubiquitous Environ., 2 (7): e3 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Periodic Action Temporal Localization Method Based on Two-Path Architecture for Product Counting in Sewing Video., , , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 568-580. Springer, (2019)PON: Proposal Optimization Network for Temporal Action Proposal Generation., , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 145-157. Springer, (2020)Improving energy-efficiency of large-scale workflows in heterogeneous systems., and . Int. J. Comput. Sci. Eng., 13 (3): 258-267 (2016)An energy-efficient adaptive resource provision framework for cloud platforms., and . Int. J. Comput. Sci. Eng., 13 (4): 346-354 (2016)Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds., , and . J. Supercomput., 74 (7): 2935-2955 (2018)The parameter optimization based on LVPSO algorithm for detecting multi-step attacks., , , , , and . CF, page 24-31. ACM, (2019)CPPM: a lightweight performance prediction middleware for cloud platforms.. Int. J. Inf. Technol. Manag., 18 (4): 419-434 (2019)Three-side Gaming Model for Resource Co-allocation in Grid Computing., , and . J. Softw., 7 (9): 2125-2132 (2012)Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks., , and . J. Networks, 9 (1): 231-237 (2014)A Fuzzy Vault Scheme for Ordered Biometrics., , , , and . J. Commun., 6 (9): 682-690 (2011)