Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Performance of CAPE Using Discontinuous Incremental Checkpointing., and . HPCC, page 802-807. IEEE, (2011)A Framework to Describe and Search for Virtual Resource Objects., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 208-219. Springer, (2010)Design and implementation of a new execution model for CAPE., , , and . SoICT, page 453-459. ACM, (2017)WEKA-based Real-Time Attack Detection for VANET Simulations., , and . SoftCOM, page 1-6. IEEE, (2023)Road Anomaly Detection Using Smartphone: A Brief Analysis., , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 86-97. Springer, (2018)Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion Detection., , and . MLN, volume 12629 of Lecture Notes in Computer Science, page 154-166. Springer, (2020)Predictive Scheme for Location Service in Mobile Ad-Hoc Networks., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 522-531. Springer, (2009)Hierarchical Location Service with Prediction in Mobile Ad-Hoc Networks, , and . CoRR, (2010)Checkpointing Aided Parallel Execution Model and Analysis., and . HPCC, volume 4782 of Lecture Notes in Computer Science, page 707-717. Springer, (2007)Evaluating the Upper Bound of Energy Cost Saving by Proactive Data Center Management., , , and . IEEE Trans. Netw. Serv. Manag., 17 (3): 1527-1541 (2020)