From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Iterative time reversal based flaw identification., и . Comput. Math. Appl., 72 (4): 879-892 (2016)Spice: A Service Platform for Future Mobile IMS Services., , , , , , и . WOWMOM, стр. 1-8. IEEE Computer Society, (2007)Cost-Optimized, Data-Protection-Aware Offloading Between an Edge Data Center and the Cloud., , , , и . IEEE Trans. Serv. Comput., 16 (1): 206-220 (января 2023)Enforcement of Individual Privacy Policies by Communication Service Providers., и . Distributed Usage Control, том 10141 из Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach., , , , , , , , и . CCGRID, стр. 279-288. IEEE, (2022)Safe and Fast Reinforcement Learning for Network Slicing Resource Allocation., , , , , и . VTC2023-Spring, стр. 1-7. IEEE, (2023)Experiences and Feedback from the Pilots., , и . Attribute-based Credentials for Trust, Springer, (2015)Distributed Redundancy or Cluster Solution? An Experimental Evaluation of Two Approaches for Dependable Mobile Internet Services., , , , , и . ISAS, том 3335 из Lecture Notes in Computer Science, стр. 33-47. Springer, (2004)Reinforcement learning for antennas' electric tilts optimization in self organizing networks., , , и . PIMRC, стр. 1122-1127. IEEE, (2021)Optimized Application Deployment using Fog and Cloud Computing Environments., , , и . SE, том P-300 из LNI, стр. 117-119. Gesellschaft für Informatik e.V., (2020)