Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent and Agile Control of Edge Resources for Latency-Sensitive IoT Services., and . IEEE Access, (2020)Multi-Target Classification Based Automatic Virtual Resource Allocation Scheme., , , , and . IEICE Trans. Inf. Syst., 102-D (5): 898-909 (2019)Resource Negotiation Game for Cloud Networks with Limited Resources., , , and . CloudNet, page 1-4. IEEE, (2018)Salience-Based Distributed Controllers Placement in Software Defined Networks., , , , and . GLOBECOM, page 1-7. IEEE, (2018)Route advertisement policies for border gateway protocol with provider aggregatable addressing., , and . HPSR, page 42-48. IEEE, (2016)Optimum Route Design in 1+1 Protection with Network Coding for Instantaneous Recovery., and . IEICE Trans. Commun., 97-B (1): 87-104 (2014)Instantaneous recovery route design scheme using multiple coding-aware protection scenarios., , , and . Telecommun. Syst., 64 (1): 75-85 (2017)Differential delay aware instantaneous recovery scheme with traffic splitting., and . Int. J. Commun. Syst., (2017)Recommending Location for Placing Data Collector in the OPC Classic., , , , and . ICPS, page 158-165. IEEE, (2021)DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G Networks., , , and . CNSM, page 1-5. IEEE, (2023)