Author of the publication

Reasonably Migrating Virtual Machine in NFV-Featured Networks.

, , , , and . CIT, page 361-366. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Half-sweep RSOR iteration with three-point linear rational finite difference scheme for solving first-order Fredholm integro-differential equations., , and . Int. J. Comput. Sci. Math., 17 (2): 182-194 (2023)How to Protect Personal Information against Keyloggers., , and . IMSA, page 275-280. IASTED/ACTA Press, (2005)Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks., and . ISCIT, page 238-243. IEEE, (2011)An adaptive method to identify disk cluster size based on block content., , , , and . Digital Investigation, 7 (1-2): 48-55 (2010)Towards selecting optimal features for flow statistical based network traffic classification., , , and . APNOMS, page 479-482. IEEE, (2015)A dynamic association control mechanism for bus networks., , , , and . ISCIT, page 244-249. IEEE, (2011)Overview of Control and Matching Design of Hydraulic Retarder., , and . ICITEE, page 124:1-124:4. ACM, (2019)Providing flexible services for heterogeneous vehicles: an NFV-based approach., , , , and . IEEE Netw., 30 (3): 64-71 (2016)A novel file carving algorithm for docker container logs recorded by json-file logging driver., , , and . Digit. Investig., (2021)A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm., , , and . Future Internet, 15 (4): 122 (April 2023)