Author of the publication

Data security over wireless transmission for enterprise multimedia security with fountain codes.

, , , , and . Multim. Tools Appl., 79 (15-16): 10781-10803 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Optimizing Top-k Composite Services towards Preference-Aware Service Dominance., , , and . Int. J. Web Serv. Res., 10 (2): 63-86 (2013)Dynamic Resource Allocation for Load Balancing in Fog Environment., , , , , , , and . Wirel. Commun. Mob. Comput., (2018)Scheduling dependent coflows to minimize the total weighted job completion time in datacenters., , , , , , , , and . Comput. Networks, (2019)Placing Wireless Chargers With Limited Mobility., , , , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3589-3603 (June 2023)Dynamic Resource Provisioning With Fault Tolerance for Data-Intensive Meteorological Workflows in Cloud., , , , , and . IEEE Trans. Ind. Informatics, 16 (9): 6172-6181 (2020)A QoS-aware composition method supporting cross-platform service invocation in cloud environment., , , and . J. Comput. Syst. Sci., 78 (5): 1316-1329 (2012)DisCOV: Distributed COVID-19 Detection on X-Ray Images with Edge-Cloud Collaboration., , , , , and . SERVICES, page 23. IEEE, (2022)Offloading Deadline-aware Task in Edge Computing., and . CLOUD, page 28-30. IEEE, (2020)IIoT Mobile Business Data Placement Strategy Based on Bayesian Optimization Algorithm., , , , , and . HPCC/DSS/SmartCity/DependSys, page 186-193. IEEE, (2022)A Service Migration Method for Resource Competition in Mobile Edge Computing., , , , and . IPCCC, page 1-8. IEEE, (2021)