Author of the publication

Performance analysis of data intensive cloud systems based on data management and replication: a survey.

, , , , , , , , , , , , , , , , and . Distributed Parallel Databases, 34 (2): 179-215 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C2Hunter: Detection and Mitigation of Covert Channels in Data Centers., , , , , , and . Handbook on Data Centers, Springer, (2015)Diverse routing in multi-domain optical networks with correlated and probabilistic multi-failures., , , and . ICC, page 6247-6251. IEEE, (2012)A robust iris localization scheme for the iris recognition., , , , and . Multim. Tools Appl., 80 (3): 4579-4605 (2021)Lowest priority first based feasibility analysis of real-time systems., , , and . J. Parallel Distributed Comput., 73 (8): 1066-1075 (2013)Revisiting Fixed Priority Techniques., , , and . EUC, volume 4808 of Lecture Notes in Computer Science, page 134-145. Springer, (2007)Pupil detection schemes in human eye: a review., , and . Multim. Syst., 27 (4): 753-777 (2021)Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics., , , , , , , and . Future Gener. Comput. Syst., (2019)XenPump: A New Method to Mitigate Timing Channel in Cloud Computing., , , , and . IEEE CLOUD, page 678-685. IEEE Computer Society, (2012)COVID-19 outbreak and the role of digital twin., , , and . Multim. Tools Appl., 81 (19): 26857-26871 (2022)C2Detector: a covert channel detection framework in cloud computing., , , , , and . Secur. Commun. Networks, 7 (3): 544-557 (2014)