From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments., , , и . Int. J. Secur. Networks, 7 (4): 196-210 (2012)Utility-Based Location Distribution Reverse Auction Incentive Mechanism for Mobile Crowd Sensing Network., , , и . ICA3PP (2), том 11945 из Lecture Notes in Computer Science, стр. 116-127. Springer, (2019)Modeling access control for cyber-physical systems using reputation., , , , и . Comput. Electr. Eng., 38 (5): 1088-1101 (2012)Enabling Embedded Inference Engine with ARM Compute Library: A Case Study., , и . CoRR, (2017)Performance Study of MUSCL Schemes Based on Different Numerical Fluxes.. Wireless Personal Communications, 102 (2): 1763-1772 (2018)Understanding data flow graph for improving big data stream computing environments., , , и . IJCSM, 5 (4): 394-404 (2014)Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective., , , , и . Int. J. Wirel. Mob. Comput., 6 (4): 331-337 (2013)Modelling, evaluating and designing virtual machine scheduling by a clustering mechanism in cloud computing environments., , , и . Int. J. Wirel. Mob. Comput., 5 (1): 70-76 (2011)A fast search strategy to optimise path founding in big data graph computing environments., и . Int. J. Wirel. Mob. Comput., 13 (2): 139-143 (2017)A common control channel selection algorithm for cognitive wireless mesh networks., , , и . Int. J. Wirel. Mob. Comput., 9 (3): 218-223 (2015)