Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic Algorithm to Optimize Fitness Function with Sampling Error and its Application to Financial Optimization Problem., , , and . IEEE Congress on Evolutionary Computation, page 81-87. IEEE, (2006)Dripcast - Server-less Java Programming Framework for Billions of IoT Devices., , and . COMPSAC Workshops, page 186-191. IEEE Computer Society, (2014)m-cloud - Distributed Statistical Computation Using Multiple Cloud Computers., , , , and . COMPSAC Workshops, page 301-305. IEEE Computer Society, (2014)A Control Mechanism for Live Migration with Data Regulations Preservation., , , , , , , and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 509-522. Springer, (2017)Policy Management Technique Using Blockchain for Cloud VM Migration., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 360-362. IEEE, (2019)Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment., , , and . Comput., 12 (2): 27 (February 2023)Noble Inheritance Mechanism of Digital Content for "Digital-Ji-in" toward Sustainable Society., , , , , and . CANDAR (Workshops), page 254-259. IEEE, (2020)Toward a Container Migration Data-Auditing Mechanism for Edge Computing Environment., , , and . ICCSA (Workshops 3), volume 13379 of Lecture Notes in Computer Science, page 90-102. Springer, (2022)A communication computation model for developing computer supported cooperative work systems., , and . ISADS, page 213-220. IEEE Computer Society, (1997)Countermeasures Against Backdoor Attacks Towards Malware Detectors., , , , , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 295-314. Springer, (2021)