Author of the publication

EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds.

, , , , and . Peer-to-Peer Netw. Appl., 15 (2): 973-987 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical studies on Boussinesq-type equations via a split-step Fourier method., and . Int. J. Comput. Math., 87 (8): 1768-1784 (2010)An empirical study on the prediction model of postgraduate education in Hebei Province., , and . ICMLC, page 1327-1331. IEEE, (2010)Application of Analysis CRM Based on Association Rules Mining in Variable Precision Rough Set., and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 418-423. Springer, (2011)A Reliable and Efficient MAC Layer Multicast Protocol in Wireless LANs., , , and . VTC Spring, IEEE, (2009)Infrared image saliency detection based on human vision and information theory., , , , , and . CISP-BMEI, page 484-488. IEEE, (2016)Ad Hoc and Sensor Networks., and . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)A Simple Real LST Reconstruction Method Combining Thermal Infrared and Microwave Remote Sensing Based on Temperature Conservation., , , , , and . Remote. Sens., 15 (12): 3033 (June 2023)Multisymplectic structure-preserving scheme for the coupled Gross-Pitaevskii equations., and . Int. J. Comput. Math., 98 (4): 783-806 (2021)Controllability of Boolean control networks with multiple time delays in both states and controls., and . Frontiers Inf. Technol. Electron. Eng., 24 (6): 906-915 (June 2023)A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 318-330 (2021)