From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Scalable and Performant Grid Monitoring Framework., , , , , и . PDPTA, стр. 224-230. CSREA Press, (2005)Design and Evaluation of Automatic Workflow Scaling Algorithms for Multi-tenant SaaS., , , , и . CLOSER (1), стр. 221-229. SciTePress, (2016)Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models., , , , и . DIMVA, том 13358 из Lecture Notes in Computer Science, стр. 23-41. Springer, (2022)Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection., , , , и . J. Cybersecur. Priv., 3 (2): 118-144 (апреля 2023)Fog Native Architecture: Intent-Based Workflows to Take Cloud Native toward the Edge., , , , и . IEEE Commun. Mag., 60 (8): 44-50 (2022)SpeCH: A scalable framework for data placement of data-intensive services in geo-distributed clouds., , , , и . J. Netw. Comput. Appl., (2019)SRFog: A flexible architecture for Virtual Reality content delivery through Fog Computing and Segment Routing., , , , , и . IM, стр. 1038-1043. IEEE, (2021)Live Demonstration of a Highly Scalable Fog Service Orchestrator., , и . NetSoft, стр. 363-365. IEEE, (2021)Anomaly detection framework for SFC integrity in NFV environments., , , , и . NetSoft, стр. 1-5. IEEE, (2017)Comparing topology and stream based strategies for modeling service function chains., и . NetSoft, стр. 234-242. IEEE, (2016)