Author of the publication

Metaheuristic Optimization for Long-term IaaS Service Composition.

, , , and . IEEE Trans. Serv. Comput., 11 (1): 131-143 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aggregation Functions Considering Criteria Interrelationships in Fuzzy Multi-Criteria Decision Making: State-of-the-Art., , and . IEEE Access, (2018)Stance and Credibility Based Trust in Social-Sensor Cloud Services., , and . WISE (2), volume 11234 of Lecture Notes in Computer Science, page 178-189. Springer, (2018)Paradox in Applications of Semantic Similarity Models in Information Retrieval., , and . IT Revolutions, volume 11 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 60-68. Springer, (2008)Semantic Web Service matchmakers: state of the art and challenges., , and . Concurr. Comput. Pract. Exp., 25 (7): 961-988 (2013)Cloud service selection: State-of-the-art and future research directions., , , , and . J. Netw. Comput. Appl., (2014)Metaheuristic Optimization for Long-term IaaS Service Composition., , , and . IEEE Trans. Serv. Comput., 11 (1): 131-143 (2018)Long-Term QoS-Aware Cloud Service Composition Using Multivariate Time Series Analysis., , , and . IEEE Trans. Serv. Comput., 9 (3): 382-393 (2016)IaaS Reservation Optimization for Multi-QoS Level based SaaS Provisioning.. Aust. J. Intell. Inf. Process. Syst., 16 (1): 65-72 (2019)Service-requester-centered service selection and ranking model for digital transportation ecosystems., and . Computing, 97 (1): 79-102 (2015)Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound., , , , , and . CoRR, (2023)