Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services., , , , , and . USENIX Annual Technical Conference, page 235-249. USENIX Association, (2017)Privacy-preserving virtual machine checkpointing mechanism., , , , , and . Int. J. Cloud Comput., 3 (3): 245-266 (2014)Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field Fp., , , , and . GCC, page 163-167. IEEE Computer Society, (2010)Application of neural networks for predicting hot-rolled strip crown., , , , and . Appl. Soft Comput., (2019)Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines., , , , , , , and . CLOUD, page 613-620. IEEE Computer Society, (2015)Privacy-preserving Virtual Machine., , , and . ACSAC, page 231-240. ACM, (2015)TriangleConv: A Deep Point Convolutional Network for Recognizing Building Shapes in Map Space., , , , , and . ISPRS Int. J. Geo Inf., 10 (10): 687 (2021)Quick Eviction of Virtual Machines through Proactive Snapshots., , , , , , and . CLUSTER, page 156-157. IEEE Computer Society, (2016)Few-Shot Building Footprint Shape Classification with Relation Network., , , , , and . ISPRS Int. J. Geo Inf., 11 (5): 311 (2022)Performance analysis of a backlight dimming method using weighted mean-square-error based on joint edge-saliency characteristics., , , , , and . Displays, (2020)