Author of the publication

An anomaly detection on the application-layer-based QoS in the cloud storage system.

, , , , and . Comput. Sci. Inf. Syst., 13 (2): 659-676 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Long-distance Transmission of Nodes in Amorphous Flat Air-to-ground Wireless Ad-Hoc Network Based on Bidirectional Relay Beamforming., , , , and . Ad Hoc Sens. Wirel. Networks, 51 (1-3): 41-59 (2022)Unveil the Switching Deficits in Depression by the Dwelling Time in Dominant Community of Resting-State Networks., , , , , , and . BIH, volume 9250 of Lecture Notes in Computer Science, page 317-324. Springer, (2015)The Parallel Processing Based on CUDA for Convolution Filter FDK Reconstruction of CT., , , , and . PAAP, page 149-153. IEEE Computer Society, (2010)K maximum probability attack paths generation algorithm for target nodes in networked systems., , , , and . Int. J. Inf. Sec., 20 (4): 535-551 (2021)Network Security Evaluation Algorithm Based on Access Level Vectors., , , and . ICYCS, page 1538-1544. IEEE Computer Society, (2008)Effective method for automatic contour extraction in computerized tomography reconstruction., , , , and . J. Electronic Imaging, 17 (1): 013016 (2008)Direct Transposition Interleaving Technique for DNA Data Storage., , and . ICBEA, page 60-65. IEEE, (2023)An anomaly detection on the application-layer-based QoS in the cloud storage system., , , , and . Comput. Sci. Inf. Syst., 13 (2): 659-676 (2016)K maximum probability attack paths dynamic generation algorithm., , and . Comput. Sci. Inf. Syst., 13 (2): 677-689 (2016)Designing a Service portfolio for a Taiwanese Hospital Telecare Center., , and . PACIS, page 14. (2016)