Author of the publication

GBooster: Towards Acceleration of GPU-Intensive Mobile Applications.

, , , , , and . ICDCS, page 1408-1418. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Localization Method Avoiding Flip Ambiguities for Micro-UAVs with Bounded Distance Measurement Errors., , , , and . IEEE Trans. Mob. Comput., 18 (8): 1718-1730 (2019)Combined Communication and Computing Resource Scheduling in Sliced 5G Multi-Access Edge Computing Systems., , , and . IEEE Trans. Veh. Technol., 71 (3): 3144-3154 (2022)Admission Control with Latency Considerations for 5G Mobile Edge Computing., , and . WoWMoM, page 167-174. IEEE, (2023)Forwarding Schemes for EM-based Wireless Nanosensor Networks in the Terahertz Band., , and . NANOCOM, page 17:1-17:6. ACM, (2015)Heavy-Hitter Flow Identification in Data Centre Networks Using Packet Size Distribution and Template Matching., , , and . LCN, page 10-17. IEEE, (2019)Realtime BGP Anomaly Detection Using Graph Centrality Features., , , , , and . AINA (3), volume 201 of Lecture Notes on Data Engineering and Communications Technologies, page 222-233. Springer, (2024)ElasticWISP: Energy-Proportional WISP Networks., , and . NOMS, page 1-9. IEEE, (2020)Traffic Classification with Machine Learning in a Live Network., , , and . IM, page 488-493. IFIP, (2019)Equivalent forwarding set evaluation in software defined networking., , , and . IM, page 576-579. IEEE, (2017)Trust-based Scheme for Cheating and Collusion Detection in Wireless Multihop Networks., and . MobiQuitous, page 205-214. ACM, (2017)