Author of the publication

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds.

, , , , and . IEEE Trans. Parallel Distributed Syst., 28 (9): 2674-2688 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining Database Consistency in the Presence of Schema Evolution.. DS-6, volume 74 of IFIP Conference Proceedings, page 549-572. Chapman & Hall, (1995)An Object-Oriented Approach to Interoperation of Heterogeneous Information Sources., and . International Hong Kong Computer Society Database Workshop, page 49-63. Springer, Singapore, (1996)Mondrian tree: A fast index for spatial alarm processing., and . ACM TIST, 5 (1): 4:1-4:25 (2013)Efficient web change monitoring with page digest., , and . WWW (Alternate Track Papers & Posters), page 476-477. ACM, (2004)Automatic detection of fragments in dynamically generated web pages., , , and . WWW, page 443-454. ACM, (2004)A new butterfly-shaped attractor of Lorenz-like system, , , and . Chaos, Solitons & Fractals, 28 (5): 1196--1203 (June 2006)An Expiration Age-Based Document Placement Scheme for Cooperative Web Caching., and . IEEE Trans. Knowl. Data Eng., 16 (5): 585-600 (2004)Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel., , and . ISIT, page 961-965. IEEE, (2014)Joint clustering and inter-cell resource allocation for CoMP in ultra dense cellular networks., , , , and . ICC, page 2560-2564. IEEE, (2015)StackVault: Protection from Untrusted Functions., , , , , and . CoRR, (2019)