Author of the publication

Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems.

, , , , and . IEEE Wirel. Commun., 23 (5): 120-128 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Minimum Coincidence Routing Approach in Wavelength-Routed Optical WDM Networks., , , , , , , , and . LANOMS, IEEE, (2009)An Approach to a Fault Tolerance LISP Architecture., , , , , , and . WWIC, volume 6649 of Lecture Notes in Computer Science, page 338-349. Springer, (2011)Improving learning automata-based routing in Wireless Sensor Networks., , , , , and . GLOBECOM, page 171-176. IEEE, (2012)A Beacon-assisted direction-aware scanning scheme for 802.11-based discovery in Fog-to-Cloud systems., , and . PIMRC, page 1-6. IEEE, (2018)Towards user-centric, switching cost-aware fog node selection strategies., , and . Future Gener. Comput. Syst., (2021)What is a Fog Node A Tutorial on Current Concepts towards a Common Definition., , , , , , and . CoRR, (2016)mF2C: The Evolution of Cloud Computing Towards an Open and Coordinated Ecosystem of Fogs and Clouds., , , , , , , , , and 1 other author(s). Euro-Par Workshops, volume 11997 of Lecture Notes in Computer Science, page 136-147. Springer, (2019)A Machine Learning IDS for Known and Unknown Anomalies., , , and . DRCN, page 1-5. IEEE, (2022)Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems., , , , , and . CIoT, page 1-7. IEEE, (2018)Data Preservation through Fog-to-Cloud (F2C) Data Management in Smart Cities., , , and . ICFEC, page 1-9. IEEE, (2018)