Author of the publication

A QoS-Aware Data Reconstruction Strategy for a Data Fault-Tolerant Storage System.

, , , , , , , and . CloudCom, page 274-281. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unifying Augmentation Algorithm for Two-Edge Connectivity and Biconnectivity., and . J. Comb. Optim., 2 (3): 237-256 (1998)Graph Searching on Some Subclasses of Chordal Graphs., , , , and . Algorithmica, 27 (3): 395-426 (2000)Simpler and faster biconnectivity augmentation.. J. Algorithms, 45 (1): 55-71 (2002)A Linear Time Algorithm for Triconnectivity Augmentation (Extended Abstract), and . FOCS, page 548-559. IEEE Computer Society, (1991)Efficient implementation of virtual processing for some combinatorial algorithms on the MasPar MP-1., and . SPDP, page 154-159. IEEE, (1995)On The Damage and Compensation of Privacy Leakage., , , and . DBSec, volume 144 of IFIP, page 311-324. Kluwer/Springer, (2004)Prolong Lifetime of Dynamic Sensor Network by an Intelligent Wireless Charging Vehicle., , , , , , and . VTC Fall, page 1-5. IEEE, (2015)Privacy-Preserving Collaborative Recommender Systems., , , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 40 (4): 472-476 (2010)Toward Empirical Aspects of Secure Scalar Product., , , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 39 (4): 440-447 (2009)Bounds on the Client-Server Incremental Computing., , and . IEICE Transactions, 89-A (5): 1198-1206 (2006)