Author of the publication

Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments.

, , , and . ChinaGrid, page 223-227. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing., , , , , and . Computers & Security, (2014)The impacts of internal threats towards Routing Protocol for Low power and lossy network performance., , , and . ISCC, page 789-794. IEEE Computer Society, (2013)Differentially Private Wireless Data Publication in Large-Scale WLAN Networks., , , and . ICPADS, page 290-297. IEEE Computer Society, (2015)Some new characters on the wire-tap channel of type II., , , and . IEEE Trans. Information Theory, 51 (3): 1222-1229 (2005)An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail., , and . IEEE Trans. Vehicular Technology, 65 (10): 8658-8668 (2016)Autonomous cooperative energy trading between prosumers for microgrid systems., , , and . LCN Workshops, page 693-696. IEEE Computer Society, (2014)Portable Phenotyping System: A Portable Machine-Learning Approach to i2b2 Obesity Challenge., , , , , , , , , and . ICHI Workshops, page 86-87. IEEE Computer Society, (2018)Question Answering Experiments and Resources., , , , , , , , , and 3 other author(s). TREC, Special Publication 500-272, National Institute of Standards and Technology (NIST), (2006)Relative generalized Hamming weights of one-point algebraic geometric codes., , , , and . ITW, page 137-141. IEEE, (2014)Capacity region of non-degraded wiretap channel with noiseless feedback., , , and . ISIT, page 244-248. IEEE, (2012)