Author of the publication

Resource Provisioning in the Edge for IoT Applications With Multilevel Services.

, , , , , and . IEEE Internet of Things Journal, 6 (3): 4262-4271 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quasi-Finite-Time Control of Antagonistic Actuated Robots Using Mapping Filtered Forwarding Techniques - Quasi-Finite-Time Control., , and . Journal of Intelligent and Robotic Systems, 86 (1): 49-62 (2017)Adaptive Control of Nonlinear Time-Delay Systems With Application to a Two-Stage Chemical Reactor., and . IEEE Trans. Automat. Contr., 60 (4): 1074-1079 (2015)Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud., , and . IEEE/ACM Trans. Netw., 23 (2): 603-615 (2015)H∞ model approximation for discrete-time Takagi-Sugeno fuzzy systems with Markovian jumping parameters., , , , , and . Neurocomputing, (2015)Nonparametric Inference for an Inverse-Probability-Weighted Estimator with Doubly Truncated Data.. Communications in Statistics - Simulation and Computation, 44 (2): 489-504 (2015)Spatial Intelligence for Regional Analysis., , , , and . IJAGR, 5 (2): 59-73 (2014)A low-cost hardware-in-the-loop-simulation testbed of quadrotor UAV and implementation of nonlinear control schemes., , , and . Robotica, 35 (3): 588-612 (2017)Copolymer dielectrics with balanced chain-packing density and surface polarity for high-performance flexible organic electronics, , , , , , , , , and 5 other author(s). Nature Communications, 9 (1): 2339-- (2018)How Methylammonium Cations and Chlorine Dopants Heal Defects in Lead Iodide Perovskites, , , , , , and . Advanced Energy Materials, (May 2018)Efficient classification using parallel and scalable compressed model and Its application on intrusion detection., , , and . CoRR, (2014)