Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SLA-based cloud resource provisioning optimisation mechanism for multi-tenant applications., , , , and . IJAACS, 8 (4): 374-391 (2015)Towards a Practical, Secure, and Very Large Scale Online Election., and . ACSAC, page 161-169. IEEE Computer Society, (1999)Data Quality Evaluation of ZY-1 02C Satellite., , , , and . CCTA (2), volume 393 of IFIP Advances in Information and Communication Technology, page 187-195. Springer, (2012)A New Variation of Chord with Novel Improvement on Lookup Locality., and . GCA, page 18-24. CSREA Press, (2006)Study on pre-control of non-power vessels based on risk assessment., , and . SMC, page 184-188. IEEE, (2011)Game Analysis of Non-trusted Threshold Authentication Scheme., and . CIS, page 450-453. IEEE Computer Society, (2010)DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform., , , and . WorldCIS, page 15-20. IEEE, (2011)Recommendations Based on Comprehensively Exploiting the Latent Factors Hidden in Items' Ratings and Content., , , and . TKDD, 11 (3): 35:1-35:27 (2017)Methods for Evaluating the Technological Innovation Capability for the High-Tech Enterprises With Generalized Interval Neutrosophic Number Bonferroni Mean Operators., , , , and . IEEE Access, (2019)High order compact computation and nonuniform grids for streamfunction vorticity equations., , and . Applied Mathematics and Computation, 179 (1): 108-120 (2006)