Author of the publication

Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach.

, , , , , and . IEEE Trans. Cloud Comput., 11 (2): 1871-1885 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography., , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 167-177. Springer, (2009)Authenticated health monitoring scheme for wireless body sensor networks., and . BODYNETS, page 31-35. ICST / ACM, (2012)Multi-tenant Network Monitoring Based on Software Defined Networking., and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 327-341. Springer, (2013)Improve Security Over Multiple Cloud Service Providers for Resource Allocation., , and . ICDIS, page 145-148. IEEE, (2018)Automatic Web Service Detection in Oil and Gas., , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 193-200. Springer, (2009)Deployment models: Towards eliminating security concerns from cloud computing., , , and . HPCS, page 189-195. IEEE, (2010)Flexible building blocks for software defined network function virtualization., and . QSHINE, page 37-43. IEEE, (2014)Parallel Blockchain: An Architecture for CPSS-Based Smart Societies., , , and . IEEE Trans. Comput. Social Systems, 5 (2): 303-310 (2018)Neural Network Frameworks. Comparison on Public Transportation Prediction., , and . IPDPS Workshops, page 842-849. IEEE, (2019)An efficient cascaded method for network intrusion detection based on extreme learning machines., , , and . J. Supercomput., 74 (11): 5797-5812 (2018)