Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A snapshot system based on cloud storage Log-Structured Block System., , and . ICNSC, page 392-398. IEEE, (2014)A new I/O scheduler designed for SSD through exploring performance characteristics., , and . ComComAP, page 161-166. IEEE, (2014)Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks., , , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 733-744. Springer, (2012)An Evolutionary Computation Based Feature Selection Method for Intrusion Detection., , , and . Security and Communication Networks, (2018)SecCloud: Bridging Secure Storage and Computation in Cloud., , , , and . ICDCS Workshops, page 52-61. IEEE Computer Society, (2010)Deriving Individual-Tree Biomass from Effective Crown Data Generated by Terrestrial Laser Scanning., , , and . Remote Sensing, 11 (23): 2793 (2019)Effectively Mitigating I/O Inactivity in vCPU Scheduling., , , , , , , , , and 1 other author(s). USENIX Annual Technical Conference, page 267-280. USENIX Association, (2018)Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid., , , , and . IEEE Systems Journal, 8 (2): 598-607 (2014)Diagnosing the Interference on CPU-GPU Synchronization Caused by CPU Sharing in Multi-Tenant GPU Clouds., , , and . IPCCC, page 1-10. IEEE, (2021)Study on the Estimation of Forest Volume Based on Multi-Source Data., , , , , and . Sensors, 21 (23): 7796 (2021)