Author of the publication

A Fuzzy Algorithm for Parallelizability Evaluation and Load Balance on the Multi-core Processor.

, , and . GrC, page 168-171. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Head Record Cache Structure to Improve the Operations on Big Files in Cloud Storage Servers., , , , , and . HPCC/CSS/ICESS, page 46-51. IEEE, (2015)A chaos-oriented prediction and suppression model to enhance the security for cyber physical power systems., , and . J. Parallel Distributed Comput., (2017)A scheduling algorithm for autonomous driving tasks on mobile edge computing servers., , , and . J. Syst. Archit., (2019)TryonCM2: Try-on-Enhanced Fashion Compatibility Modeling Framework., , , , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (1): 246-257 (January 2024)A piecewise geometry method for optimizing the motion planning of data mule in tele-health wireless sensor networks., , , , and . Wirel. Networks, 20 (7): 1839-1858 (2014)Message from the General Chairs.. BigDataSecurity/HPSC/IDS, page 1. IEEE, (2022)Practical Training in the Embedded System Education: A New Way to Narrow the Gap with Industry., , , and . ICYCS, page 2522-2527. IEEE Computer Society, (2008)A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design., , and . TrustCom/BigDataSE, page 861-866. IEEE, (2018)Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs., , and . J. Softw., 4 (10): 1091-1101 (2009)A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security., , , and . Inf. Sci., (2020)