Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Channel assignment using block design in wireless mesh networks., , , and . Comput. Commun., 32 (7-10): 1148-1153 (2009)Multi-resource allocation in cloud radio access networks., , , , and . ICC, page 1-6. IEEE, (2017)Handling least privilege problem and role mining in RBAC., , , and . J. Comb. Optim., 30 (1): 63-86 (2015)Delay-bounded and minimal energy broadcast in satellite networks with multi-power levels., , , , and . ICC, page 1-6. IEEE, (2017)Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources., , and . J. Syst. Softw., 83 (4): 675-688 (2010)Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets., and . IEEE Trans. Dependable Secur. Comput., 8 (6): 852-865 (2011)A Tree Regression-Based Approach for VM Power Metering., , , , and . IEEE Access, (2015)Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing., , , , and . IoTBD, page 243-254. SciTePress, (2016)Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 206-217. Springer, (2020)A technique for generating the reduced reachability graph of petri net models., , , and . SMC, page 3636-3641. IEEE, (2008)