Author of the publication

An adaptive prediction approach based on workload pattern discrimination in the cloud.

, , , , , and . J. Netw. Comput. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mobile Web Service Middleware and Its Performance Study, , , and . Transactions on Large-Scale Data- and Knowledge-Centered Systems III, volume 6790 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2011)Incorporating Dynamic Constraints in the Flexible Authorization Framework., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)Transactional Network Analysis and Money Laundering Behavior Identification of Central Bank Digital Currency of China., , , and . J. Soc. Comput., 3 (3): 219-230 (2022)Databox-based Delivery Service via Blockchain., , , , and . ICWS, page 79-84. IEEE, (2022)Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain., , , , , and . ICWS, page 629-634. IEEE, (2021)Tracking anonymous peer-to-peer VoIP calls on the internet., , and . CCS, page 81-91. ACM, (2005)How to Rationally Select Your Delegatee in PoS., , , and . CoRR, (2023)Exploring Blockchains Interoperability: A Systematic Survey., , and . ACM Comput. Surv., 55 (13s): 290:1-290:38 (2023)On the Security and Performance of Blockchain Sharding., , , , and . IACR Cryptol. ePrint Arch., (2021)A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images., , , , and . Algorithms, 15 (6): 213 (2022)