Author of the publication

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.

, , , and . INCoS, page 1-8. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time to Introduce Myself!: Impact of Self-disclosure Timing of Newcomers in Online Discussion Forums., and . WebSci, page 12:1-12:9. ACM, (2015)Decision of response timing for incremental speech recognition with reinforcement learning., , and . ASRU, page 467-472. IEEE, (2011)Performance Comparison of Saliency Detection., , , , and . Adv. Multim., (2018)Incident-Driven Machine Translation and Name Tagging for Low-resource Languages., , , , , , , , , and 7 other author(s). Mach. Transl., 32 (1-2): 59-89 (2018)Performance Based Receive Antenna Selection Algorithm for Layered Space-Time System., and . VTC Spring, page 1645-1649. IEEE, (2006)Dynamic game model of botnet DDoS attack and defense., , , , , and . Secur. Commun. Networks, 9 (16): 3127-3140 (2016)Distributed Spectrum Sharing Algorithm Design and Realization., , , and . VTC Spring, page 1-5. IEEE, (2010)Power Control Design of a Battery Charger in a Hybrid Active PV Generator for Load-Following Applications., , and . IEEE Trans. Ind. Electron., 58 (1): 85-94 (2011)Low-Loss Wide-Tuning-Range Three-Pole Frequency-Agile Bandpass Diplexer With Identical Constant Absolute Bandwidth., , , , , and . IEEE Access, (2019)BejaGNN: behavior-based Java malware detection via graph neural network., , , , and . J. Supercomput., 79 (14): 15390-15414 (September 2023)