Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS-aware placement of stream processing service., , , , and . The Journal of Supercomputing, 64 (3): 919-941 (2013)Optimal data scheduling for P2P video-on-demand streaming systems., , , and . IET Communications, 6 (12): 1625-1631 (2012)Optimal Regression Testing Based on Selective Coverage of Test Requirements., , and . ISPA, page 419-426. IEEE Computer Society, (2010)On the Design and Implementation of NDSAIL: A Software Automation System with Automated Learning Mechanisms., , , , , , , and . IFIP Congress (1), volume A-12 of IFIP Transactions, page 186-192. North-Holland, (1992)Efficient Protocols for Rule Checking in RFID Systems., , , and . ICCCN, page 1-7. IEEE, (2013)Object Mapping for Layered Cooperative Systems., , , and . TOOLS (31), page 67-76. IEEE Computer Society, (1999)An Object-Oriented Developing Framework of Fault-Tolerance System., , and . TOOLS (31), page 232-238. IEEE Computer Society, (1999)LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme., , , , , and . Mobile Information Systems, (2016)QoS-aware service replication., , , , and . Internetware, page 8. ACM, (2009)An Efficient Protocol for Peer-to-Peer File Sharing with Mutual Anonymity., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 665-670. Springer, (2004)