Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal VM placement in distributed cloud environment using MOEA/D., and . Soft Comput., 23 (21): 11277-11296 (2019)Modernizing Legacy Systems: A Re-Engineering Approach., and . Int. J. Web Portals, 10 (2): 50-60 (2018)An enhanced encryption-based security framework in the CPS Cloud., , , , and . J. Cloud Comput., (2022)Dynamic rule generation and rule matching for composite environmental condition in context aware system., and . Wirel. Networks, 27 (8): 5577-5585 (2021)Deployment of ICT application in rural India - our experience., , and . ICWI, page 965-968. IADIS, (2004)Simulation and analysis of DoS attack in cloud environment., and . Int. J. Knowl. Eng. Soft Data Paradigms, 6 (1): 52-61 (2017)A Prototype for Functionality Based Network Management System., , , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 110-116. Springer, (2002)Semantic Resource Description for Grid., , , and . Asia International Conference on Modelling and Simulation, page 112-115. IEEE Computer Society, (2007)Editorial: Mobile Networks in the Era of Big Data., , , , and . Mob. Networks Appl., 24 (4): 1135-1138 (2019)A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges., and . ICT Express, 7 (2): 162-176 (2021)