Author of the publication

A Novel Resource Allocation Heuristic for a Power Constrained Data Center.

, , , , and . NBiS, page 255-260. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Static Analysis of Wearable Lower Extremity Exoskeleton Based on ANSYS Workbench., , , , and . MSN, page 510-514. IEEE Computer Society, (2013)TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks., , , , , and . Ad Hoc & Sensor Wireless Networks, 28 (3-4): 347-362 (2015)Does software reliability growth behavior follow a non-homogeneous Poisson process., , , , and . Information & Software Technology, 50 (12): 1232-1247 (2008)Simultaneous energy and information cooperation in MIMO cooperative cognitive radio systems., , , , , and . WCNC, page 351-356. IEEE, (2015)Deriving Link Context through Dependency Analysis., , and . ICETC, page 186-190. IEEE Computer Society, (2009)Construction of virtual experiment platform for research about vehicle driving control at energy-saving., , and . CSCWD, page 427-431. IEEE, (2010)Integrating Data Grid and Web Services for E-Science Applications: A Case Study of Exploring Species Distributions., , , , , and . e-Science, page 31. IEEE Computer Society, (2006)Bumpless interconnects formed with nanowire ACF for 3D applications., , and . 3DIC, page 1-6. IEEE, (2014)Multi-Round Auction for Bandwidth Assignment in Relay Transmission., , and . IEEE Wireless Commun. Letters, 3 (4): 361-364 (2014)Towards Practical IPSec over Challenged Networks., and . IMIS, page 398-402. IEEE Computer Society, (2011)