Author of the publication

E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System.

, , , , and . KSII Trans. Internet Inf. Syst., 10 (10): 4681-4702 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation Scheduling of a Hydrothermal System Considering Multiple Provincial Peak-Shaving Demands., , , , and . IEEE Access, (2019)A Novel Verifiably Encrypted Signature from Weil Pairing., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 603-607. Springer, (2013)Efficient Key Management Scheme for SCADA System., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 619-625. Springer, (2013)Innovia Vehicle Radiated Emission Investigation and CENELEC Compliance Solution.. VTC Spring, page 1-5. IEEE, (2016)A semantic tree-based approach for sketch-based 3D model retrieval., , and . ICPR, page 3880-3885. IEEE, (2016)A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2162-2171. IOS Press, (2014)Trip mode recognition using smartphone sensor data under different sampling frequencies., , , and . Web Intell., 17 (2): 151-160 (2019)A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage., , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 178-191. Springer, (2018)Buffer scheme optimization of epidemic routing in delay tolerant networks., , , and . J. Commun. Networks, 16 (6): 656-666 (2014)An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2070-2079. IOS Press, (2014)