Author of the publication

A Synthetical Performance Evaluation of OpenVZ, Xen and KVM.

, , , and . APSCC, page 587-594. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking., , , , , and . Wirel. Commun. Mob. Comput., (2021)A novel attack to track users based on the behavior patterns., , , , and . Concurr. Comput. Pract. Exp., (2017)A Novel GAN based User Desensitization Data Generation Algorithm., , and . EITCE, page 1068-1074. ACM, (2021)A Synthetical Performance Evaluation of OpenVZ, Xen and KVM., , , and . APSCC, page 587-594. IEEE Computer Society, (2010)An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals., , , and . GLOBECOM, page 1-6. IEEE, (2019)A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System., , , , , and . CCIS, page 1101-1106. IEEE, (2018)Sensitive Data Comparison Algorithm Based Spatio-temporal Label Distribution Fusion., and . AHPCAI, volume 3331 of CEUR Workshop Proceedings, page 85-91. CEUR-WS.org, (2022)iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking., , , , , and . ICPADS, page 655-662. IEEE, (2019)Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement., , , , and . Sci. Program., (2020)Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals., , , , and . Mob. Networks Appl., 27 (1): 96-108 (2022)