Author of the publication

Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach.

, , , , and . IEEE J. Sel. Areas Commun., 31 (12): 2610-2619 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags., , and . IEEE Internet Things J., 4 (3): 736-748 (2017)Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach., , , , and . IEEE Trans. Wirel. Commun., 12 (8): 4038-4047 (2013)Powering Smart Homes with Information-Centric Networking., , and . IEEE Commun. Mag., 57 (6): 40-46 (2019)Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing., , and . IEEE Trans. Netw. Sci. Eng., 7 (1): 589-602 (2020)Finding a path subject to many additive QoS constraints., , , , and . IEEE/ACM Trans. Netw., 15 (1): 201-211 (2007)Polynomial time approximation algorithms for multi-constrained QoS routing., , , and . IEEE/ACM Trans. Netw., 16 (3): 656-669 (2008)PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs., , , and . IEEE Trans. Intell. Transp. Syst., 12 (3): 736-746 (2011)A linear time algorithm for computing a most reliable source on a tree network with faulty nodes., and . Theor. Comput. Sci., 412 (3): 225-232 (2011)Signed genome rearrangement by reversals and transpositions: models and approximations., and . Theor. Comput. Sci., 259 (1-2): 513-531 (2001)Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing., , , , and . IEEE J. Sel. Areas Commun., 35 (2): 478-485 (2017)