Author of the publication

Achieving Energy Saving through Proxying Applications on behalf of Idle Devices.

, and . ANT/SEIT, volume 83 of Procedia Computer Science, page 187-194. Elsevier, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications., , , and . NGMAST, page 123-130. IEEE, (2014)Roman Urdu Opinion Mining System (RUOMiS)., , , and . CoRR, (2015)Risk Assessment and Decision Support for Sustainable Traffic Safety in Hong Kong Waters., , , and . IEEE Access, (2020)A Secure Authentication and Key Management Scheme for Wireless Sensor Networks., and . S-CUBE, volume 143 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-60. Springer, (2014)QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search., , , , , and . Sci. Program., (2020)Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid., , , , and . ICS-CSR, BCS, (2016)Saving energy by delegating network activity to home gateways., , , and . IEEE Trans. Consumer Electronics, 61 (4): 445-453 (2015)Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search., , , , , , and . IEEE Access, (2021)Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet., , , , , , and . Comput. Syst. Sci. Eng., 46 (3): 2741-2754 (2023)NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols., , , , and . Complex., (2021)