Author of the publication

System resource utilization analysis and prediction for cloud based applications under bursty workloads.

, , , , and . Inf. Sci., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Network Construction of Multivariate Time Series Using Information Geometry., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (1): 107-122 (2019)RTDCM: A Coding Preemption Collection System for Key Data Prioritization With Hierarchical Probability Exchange Mechanism in Mobile Computing., , , and . IEEE Access, (2020)A New Filter Feature Selection Based on Criteria Fusion for Gene Microarray Data., , , and . IEEE Access, (2018)Fault-Tolerant and Ubiquitous Computing in Sensor Networks., , , and . IJDSN, (2013)A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network., , , , , , and . Inf. Sci., (2021)TDTA: A truth detection based task assignment scheme for mobile crowdsourced Industrial Internet of Things., , , , and . Inf. Sci., (2022)Intelligent Detection for Key Performance Indicators in Industrial-Based Cyber-Physical Systems., , , and . IEEE Trans. Ind. Informatics, 17 (8): 5799-5809 (2021)An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (6): 4148-4157 (2022)A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks., , , , , and . IEEE Trans. Ind. Informatics, 18 (10): 7373-7383 (2022)A Cloud-Assisted Reliable Trust Computing Scheme for Data Collection in Internet of Things., , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4969-4980 (2022)