Author of the publication

A Proximity-Aware Load Balancing Algorithm in P2P Systems.

, , , and . GPC Workshops, page 364-369. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamical behavior for stochastic lattice systems, and . Chaos, Solitons & Fractals, 27 (4): 1080--1090 (February 2006)ELOTS: Energy-efficient local optimization time synchronization algorithm for WirelessHART networks., , , and . SysCon, page 402-406. IEEE, (2014)UBER: Combating Sandbox Evasion via User Behavior Emulators., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 34-50. Springer, (2019)A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks., , and . MTD@CCS, page 37-46. ACM, (2019)TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation., , , , , , and . Future Gener. Comput. Syst., (July 2023)A Study of Overflow Vulnerabilities on GPUs., , and . NPC, volume 9966 of Lecture Notes in Computer Science, page 103-115. (2016)Establishing and Verifying the Ergonomic Evaluation Metrics of Spacecraft Interactive Software Interface., , , and . AHFE (13), volume 1213 of Advances in Intelligent Systems and Computing, page 377-383. Springer, (2020)A Fuzzy Data Mining Based Intrusion Detection Model., , , and . FTDCS, page 191-197. IEEE Computer Society, (2004)A Dynamic Rebuild Strategy of Multi-host System Volume on Transparence Computing Mode., , and . HPCC, page 981-986. IEEE Computer Society, (2008)A Data Mining Based Intrusion Detection Model., , , , and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 677-684. Springer, (2003)