Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures., , , , , , and . COMPSAC Workshops, page 365-370. IEEE Computer Society, (2010)A Preliminary Review of Enterprise Serverless Cloud Computing (Function-as-a-Service) Platforms., , , and . CloudCom, page 162-169. IEEE Computer Society, (2017)FoSII - Foundations of Self-Governing ICT Infrastructures., , , and . ERCIM News, 2010 (83): 40 (2010)Achieving Reinforcement Learning Speedup via Quantum Kernel Estimation., and . ISTAS, page 1-8. IEEE, (2023)SLA-Aware Application Deployment and Resource Allocation in Clouds., , , and . COMPSAC Workshops, page 298-303. IEEE Computer Society, (2011)Cloud resource provisioning and SLA enforcement via LoM2HiS framework., , , and . Concurr. Comput. Pract. Exp., 25 (10): 1462-1481 (2013)Towards autonomic detection of SLA violations in Cloud infrastructures., , , , , and . Future Gener. Comput. Syst., 28 (7): 1017-1029 (2012)Optimizing bioinformatics workflows for data analysis using cloud management techniques., , , , and . WORKS@SC, page 37-46. ACM, (2011)Applying availability SLAs to traffic management systems., , , , and . ITSC, page 1501-1506. IEEE, (2011)Towards Automated Cost-Efficient Data Management for Federated Cloud Services., , and . CloudNet, page 158-163. IEEE, (2016)