Author of the publication

Deploying Fog Applications: How Much Does It Cost, By the Way?

, , and . CLOSER, page 68-77. SciTePress, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selection of High Strength Encapsulant for MEMS Devices Undergoing High Pressure Packaging, , , and . CoRR, (2008)Model check by kernel methods under weak moment conditions, , and . Computational Statistics & Data Analysis, 36 (3): 403--409 (May 28, 2001)Securing Embedded Networks Through Secure Collective Attestation.. Darmstadt University of Technology, Germany, (2019)FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers., , , , , , , , and . CCS, page 975-989. ACM, (2023)A practical investigation on nickel plated copper heat spreader with different catalytic activation processes for flip-chip ball grid array packages., , , , and . Microelectron. Reliab., 49 (5): 537-543 (2009)Optimising QoS-Assurance, Resource Usage and Cost of Fog Application Deployments., , and . CLOSER (Selected Papers), volume 1073 of Communications in Computer and Information Science, page 168-189. Springer, (2018)Game Interface Design: Measuring the Player's Gameplay Experience., , , and . IVIC, volume 10645 of Lecture Notes in Computer Science, page 500-509. Springer, (2017)Probabilistic Prediction of the QoS of Service Orchestrations: A Truly Compositional Approach., , and . ICSOC, volume 8831 of Lecture Notes in Computer Science, page 378-385. Springer, (2014)Bonsai in the Fog: An active learning lab with Fog computing., , , and . FMEC, page 79-86. IEEE, (2018)CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems., , , , and . ICCAD, page 1-8. ACM, (2019)