Author of the publication

Towards Application-Aware In-Network Bandwidth Management in Data Centers.

, , , and . Trustcom/BigDataSE/ISPA, page 2206-2212. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting the Effectiveness of Off-the-shelf Temporal Modeling Approaches for Large-scale Video Classification., , , , , , , , , and . CoRR, (2017)A Framework of Mobile Visual Search Based on the Weighted Matching of Dominant Descriptor., , , , , and . ACM Multimedia, page 1181-1184. ACM, (2014)AJSR: an Efficient Multiple Jumps Forwarding Scheme in Software-Defined WAN., , , , and . IEEE Access, (2017)Intelligent Trajectory Inference Through Cellular Signaling Data., , and . IEEE Trans. Cogn. Commun. Netw., 6 (2): 586-596 (2020)WARank: Weighted Asymmetric Ranking for Approximate Nearest Neighbor Search., , , , and . CIT/IUCC/DASC/PICom, page 297-304. IEEE, (2015)Communication-aware virtual machine migration in cloud data centres., , , , , and . Int. J. High Perform. Comput. Netw., 10 (4/5): 372-380 (2017)Profit-aware scheduling in task-level for datacenter networks., , , , and . Comput. Electr. Eng., (2017)On efficient virtual cluster scaling across geo-distributed data centers., , , and . Concurr. Comput. Pract. Exp., (2018)An Efficient Elephant Flow Detection with Cost-Sensitive in SDN., , , , and . EAI Endorsed Trans. Ubiquitous Environ., 2 (7): e3 (2015)Efficient Integrity Authentication Scheme for Large-Scale RFID Systems., , , , , and . IEEE Trans. Mob. Comput., 22 (9): 5216-5230 (September 2023)