Author of the publication

POSTER: An E2E Trusted Cloud Infrastructure.

, , , , , , and . ACM Conference on Computer and Communications Security, page 1517-1519. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Target Tracking Based on Optimized Particle Filter Algorithm., , , and . JSW, 8 (5): 1140-1144 (2013)Impact of individual response strategy on the spatial public goods game within mobile agents., , , , and . Applied Mathematics and Computation, (2015)A moving horizon H∞ output feedback control scheme for constrained uncertain linear systems., , and . IJMIC, 16 (1): 79-85 (2012)Prop-cut: A mesh cutting method based on Tikhonov regularization., and . CAD/Graphics, page 233-240. IEEE, (2009)A Robot that learns and teaches english language to native Chinese children., , , , and . ROBIO, page 1087-1092. IEEE, (2007)Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networks., , and . NCM, page 595-599. IEEE Computer Society, (2010)Study on Energy Consumption Status and Development Strategy of Metropolis in China: A Case Study of Shanghai., , , and . ICDMA, page 1154-1159. IEEE Computer Society, (2011)The application of PCA in the basic public service system., , , and . ICMLC, page 630-633. IEEE, (2012)Endpoint learning for multilinear commutator of singular integral on space of homogeneous type., , , , and . ICMLC, page 1319-1325. IEEE, (2012)Octa-Log-Polar Fourier Transform for Image Registration., , and . IAS, page 601-604. IEEE Computer Society, (2009)