Author of the publication

Value of service based resource management for large-scale computing systems.

, , , , , , and . Clust. Comput., 20 (3): 2013-2030 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficacy of modeling & simulation in defense life cycle engineering., and . SCSC, page 1105-1111. Simulation Councils, Inc., (2007)BioRAC: biologically inspired resilient autonomic cloud., , and . CSIIRW, page 80. ACM, (2011)A Comparative Statistical Error Analysis of Neuronavigation Systems in a Clinical Setting., , , , , , and . MICCAI, volume 1935 of Lecture Notes in Computer Science, page 144-153. Springer, (2000)CLaaS: Cybersecurity Lab as a Service., and . J. Internet Serv. Inf. Secur., 5 (4): 41-59 (2015)Effective Wireless Communication Architecture for Resisting Jamming Attacks., , , and . IEEE Access, (2020)A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare., , , , , , , and . IEEE Internet Things J., 9 (22): 22434-22452 (2022)Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain., , , , , , and . IEEE Access, (2019)Energy-efficient and secure mobile fog-based cloud for the Internet of Things., , , , , and . Future Gener. Comput. Syst., (2022)Interpretive Performance Prediction for Parallel Application Development., and . J. Parallel Distributed Comput., 60 (1): 17-47 (2000)DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks., , and . IEEE Trans. Dependable Secur. Comput., 12 (2): 164-178 (2015)