Author of the publication

A Robust Application-Level Approach for Responsiveness Differentiation.

, , , and . ICWS, page 373-380. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Supervised Depth Completion Guided by 3D Perception and Geometry Consistency., , , and . CoRR, (2023)Deep reinforcement learning based efficient access scheduling algorithm with an adaptive number of devices for federated learning IoT systems., , , and . Internet Things, (December 2023)Explainable prediction of deposited film thickness in IC fabrication with CatBoost and SHapley Additive exPlanations (SHAP) models., , , and . Appl. Intell., 54 (1): 246-263 (January 2024)A novel controllable carrier-injection mechanism in high voltage diode for reducing switching loss., , , , , and . IEICE Electron. Express, 11 (17): 20140461 (2014)Co-regularized Multi-view Subspace Clustering., , , and . ACML, volume 95 of Proceedings of Machine Learning Research, page 17-32. PMLR, (2018)Supporting data quality management in decision-making., and . Decis. Support Syst., 42 (1): 302-317 (2006)Energy-aware load dispatching in geographically located Internet data centers., and . Sustain. Comput. Informatics Syst., 1 (4): 275-285 (2011)Scripting for Administration, Automation and Security., and . SIGITE, page 147. ACM, (2018)Cybersecurity Should be Taught Top-Down and Case-Driven., and . SIGITE, page 103-108. ACM, (2017)Blind Image Deblurring via Salient Structure Detection and Sparse Representation., , and . PSIVT Workshops, volume 10799 of Lecture Notes in Computer Science, page 283-299. Springer, (2017)