Author of the publication

Enhancing service capability with multiple finite capacity server queues in cloud data centers.

, , and . Clust. Comput., 19 (4): 1747-1767 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EIFDD: An efficient approach for erasable itemset mining of very dense datasets., , , and . Appl. Intell., 43 (1): 85-94 (2015)OSSim: a generic simulation framework for overlay streaming., , and . SummerSim, page 30. Society for Computer Simulation International / ACM DL, (2013)Instance Segmentation under Occlusions via Location-aware Copy-Paste Data Augmentation., , , , and . CoRR, (2023)A heuristics approach to mine behavioural data logs in mobile malware detection system., , , and . Data Knowl. Eng., (2018)Effective Computation Resilience in High Performance and Distributed Environments., , , , , and . Comput. Informatics, 35 (6): 1386-1415 (2016)A New Approach for Mining Top-Rank-k Erasable Itemsets., , , and . ACIIDS (1), volume 8397 of Lecture Notes in Computer Science, page 73-82. Springer, (2014)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Enhancing service capability with multiple finite capacity server queues in cloud data centers., , and . Clust. Comput., 19 (4): 1747-1767 (2016)Deep Learning for Proactive Network Monitoring and Security Protection., , , and . IEEE Access, (2020)Dynamic Node Embeddings From Edge Streams., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 931-946 (2021)