Author of the publication

Min_c: Heterogeneous concentration policy for energy-aware scheduling of jobs with resource contention.

, , , , , , , , and . Program. Comput. Softw., 43 (3): 204-215 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Analysis of Secret Sharing Schemes for Cloud Storage Based on RNS., , , , , , and . CARLA, volume 796 of Communications in Computer and Information Science, page 370-383. Springer, (2017)AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage., , , , , , , , , and . Int. J. Approx. Reason., (2018)LR-GD-RNS: Enhanced Privacy-Preserving Logistic Regression Algorithms for Secure Deployment in Untrusted Environments., , , , , , , and . CCGRID, page 770-775. IEEE, (2021)Cryptographic Primitives Optimization Based on the Concepts of the Residue Number System and Finite Ring Neural Network., , , , , , , and . OLA, volume 1443 of Communications in Computer and Information Science, page 241-253. Springer, (2021)Configurable cost-quality optimization of cloud-based VoIP., , , , , , , and . J. Parallel Distributed Comput., (2019)Method for Convolutional Neural Network Hardware Implementation Based on a Residue Number System., , , , and . Program. Comput. Softw., 48 (8): 735-744 (2022)AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security., , , , , and . Future Gener. Comput. Syst., (2019)An Efficient Method for Comparing Numbers and Determining the Sign of a Number in RNS for Even Ranges., , , , , , , and . Comput., 10 (2): 17 (2022)RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage., , , , , , , and . IPDPS Workshops, page 548-553. IEEE, (2021)A Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption., , , , and . CARLA, volume 1327 of Communications in Computer and Information Science, page 115-129. Springer, (2020)