Author of the publication

Modeling virtual channel to enforce runtime properties for IoT services.

, and . ICC, page 102:1-102:17. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personal Privacy Protection Framework Based on Hidden Technology for Smartphones., , , , and . IEEE Access, (2017)An Integrated Cloud-Edge-Device Adaptive Deep Learning Service for Cross-Platform Web., , , , , , and . IEEE Trans. Mob. Comput., 22 (4): 1950-1967 (April 2023)Distributed Edge System Orchestration for Web-Based Mobile Augmented Reality Services., , , and . IEEE Trans. Serv. Comput., 16 (3): 1778-1792 (May 2023)Edge AR X5: An Edge-Assisted Multi-User Collaborative Framework for Mobile Web Augmented Reality in 5G and Beyond., , , , , , and . IEEE Trans. Cloud Comput., 10 (4): 2521-2537 (2022)IIN model: modifications and case study., , and . Comput. Networks, 35 (5): 507-519 (2001)Noise-Aware Framework for Robust Visual Tracking., , , and . IEEE Trans. Cybern., 52 (2): 1179-1192 (2022)HARS: A High-Available and Resource-Saving Service Function Chain Placement Approach in Data Center Networks., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (2): 829-847 (2022)Adversarial Learning of Object-Aware Activation Map for Weakly-Supervised Semantic Segmentation., , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (8): 3935-3946 (August 2023)Performance Modeling and Analysis of Core Service Platform for Next-Generation Network, , and . page 2357-2370. (2005)Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments., , , , , and . IEEE Trans. Serv. Comput., 11 (5): 796-809 (2018)