Author of the publication

Implementing a novel load-aware auto scale scheme for private cloud resource management platform.

, , , , and . NOMS, page 1-4. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks., , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 1183-1192. Springer, (2005)Performance Analysis of a Novel MAC Protocol For Service Differentiation In Wireless Network., , and . ICWN, page 148-154. CSREA Press, (2005)An Intersection-Centric Priority Algorithm for Traffic Simulation Based on Multi-Agents., , , and . NCM (1), page 189-194. IEEE Computer Society, (2008)Research and Design on a Novel OGSA-Based Open Content Alliance Scheme., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 440-447. Springer, (2004)Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks., , , and . IMSCCS, page 83-90. IEEE Computer Society, (2008)An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks., , and . ICEIS (4), page 220-226. (2005)Applying Mobile Agent to Intrusion Response for Ad Hoc Networks., , and . International Conference on Computational Science (2), volume 3515 of Lecture Notes in Computer Science, page 593-600. Springer, (2005)Defend mobile agent against malicious hosts in migration itineraries., , , and . Microprocess. Microsystems, 28 (10): 531-546 (2004)Numerical Simulation of Ship Tank Sloshing Based on MPS Method., , , , , and . AsiaSim (2), volume 1713 of Communications in Computer and Information Science, page 125-137. Springer, (2022)A Novel Policy and Information Flow Security Model for Active Network., , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 42-55. Springer, (2004)