Author of the publication

Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds.

, , and . J. Supercomput., 75 (5): 2837-2861 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR., and . Soft Comput., 20 (1): 399-421 (2016)Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining., , and . CoRR, (2016)An Extension for Combination of Duty Constraints in Role-Based Access Control, and . CoRR, (2010)A high-performance and scalable multi-core aware software solution for network monitoring., and . J. Supercomput., 59 (2): 720-743 (2012)PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description., , and . Petri Nets, volume 5606 of Lecture Notes in Computer Science, page 343-352. Springer, (2009)Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets., and . Future Gener. Comput. Syst., 26 (8): 1141-1150 (2010)Differential privacy preserving clustering using Daubechies-2 wavelet transform., and . Int. J. Wavelets Multiresolution Inf. Process., 13 (4): 1550028:1-1550028:35 (2015)A probabilistic trust model for cloud services using Bayesian networks., , and . Soft Comput., 28 (1): 509-526 (January 2024)Model checking the observational determinism security property using PROMELA and SPIN., and . Formal Aspects Comput., 27 (5-6): 789-804 (2015)A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology., and . Peer-to-Peer Netw. Appl., 8 (6): 1008-1022 (2015)