Author of the publication

Using Mobile Agents for Load Balancing in Peer-to-Peer Systems Hosting Virtual Servers.

, , and . J. Comput. Sci., 10 (6): 948-960 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling with Job Checkpoint in Computational Grid Environment., , and . Int. J. Model. Simul. Sci. Comput., (2011)Mitigating channel usage in cooperative caching for Mobile Ad hoc Networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 7 (2): 87-99 (2011)G-LeaSel: A Secure Multicast Model for Grid., , , , and . COMSWARE, IEEE, (2007)WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks., , and . KSII Trans. Internet Inf. Syst., 9 (3): 901-920 (2015)Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication., and . NPC Workshops, page 119-124. IEEE Computer Society, (2008)Secure Authenticated Key Establishment Protocol for Ad Hoc Networks., and . NSS, page 87-94. IEEE Computer Society, (2009)Enhanced Genetic algorithm for solving broadcast scheduling problem in TDMA based wireless networks., , , , and . COMSNETS, page 1-10. IEEE, (2010)Evaluation and Analysis of Computational Complexity for Secure Multicast Models., and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 684-694. Springer, (2003)Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment., and . SSCC, volume 467 of Communications in Computer and Information Science, page 81-91. Springer, (2014)Graduate Courses in Embedded and Real-Time Systems., and . IEEE Pervasive Computing, 6 (2): 101-104 (2007)