From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China., и . HPCC/CSS/ICESS, стр. 1387-1392. IEEE, (2015)Novel Differential Schema for High Performance Big Data Telehealth Systems Using Pre-cache., , , и . HPCC/CSS/ICESS, стр. 1412-1417. IEEE, (2015)In-memory big data analytics under space constraints using dynamic programming., , , и . Future Gener. Comput. Syst., (2018)An Approach of Secure Two-Way-Pegged Multi-sidechain., , , и . ICA3PP (2), том 11945 из Lecture Notes in Computer Science, стр. 551-564. Springer, (2019)SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing., , , , и . ACM Trans. Embed. Comput. Syst., 16 (2): 60:1-60:22 (2017)Modelization and analysis of dynamic heterogeneous redundant system., , , , , и . Concurr. Comput. Pract. Exp., (2022)Smart Resource Allocation Using Reinforcement Learning in Content-Centric Cyber-Physical Systems., , , и . SmartCom, том 10699 из Lecture Notes in Computer Science, стр. 39-52. Springer, (2017)Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing., , , , и . J. Netw. Comput. Appl., (2016)A survey on FinTech., , и . J. Netw. Comput. Appl., (2018)Blockchain-Based Multisignature Lock for UAC in Metaverse., , , , , и . IEEE Trans. Comput. Soc. Syst., 10 (5): 2201-2213 (октября 2023)