Author of the publication

Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives.

, , , , , and . ACM Comput. Surv., 52 (1): 2:1-2:23 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PCA-based network-wide correlated anomaly event detection and diagnosis., , , and . DRCN, page 149-156. IEEE, (2015)vSocial: a cloud-based system for social virtual reality learning environment applications in special education., , , , , , and . Multim. Tools Appl., 80 (11): 16827-16856 (2021)Cyber Range for Research-Inspired Learning of Ättack Defense by Pretense" Principle and Practice., , , , , and . IEEE Trans. Learn. Technol., 14 (3): 322-337 (2021)LIDAR-based virtual environment study for disaster response scenarios., , , , , and . IM, page 790-793. IEEE, (2015)False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics., , and . CoRR, (2019)Data-intensive Workflow Execution using Distributed Compute Resources., , and . ICNP, page 1-2. IEEE, (2019)Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments., , , , and . CoRR, (2019)Utility-directed resource allocation in virtual desktop clouds., , , , and . Comput. Networks, 55 (18): 4112-4130 (2011)HonestChain: Consortium blockchain for protected data sharing in health information systems., , , , , and . Peer-to-Peer Netw. Appl., 14 (5): 3012-3028 (2021)Semantic scheduling of active measurements for meeting network monitoring objectives., , and . CNSM, page 435-438. IEEE, (2010)