Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Aging in Virtualized Environments: Detection and Prediction., , , , and . ICPADS, page 718-719. IEEE Computer Society, (2012)HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree., , , , and . Telecommunication Systems, 52 (2): 1353-1365 (2013)TOWER: Practical Trust Negotiation Framework for Grids., , , , and . e-Science, page 26. IEEE Computer Society, (2006)PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations., , and . SRDS, page 199-208. IEEE Computer Society, (2007)Efficient Nonparametric Subgraph Detection Using Tree Shaped Priors., , , , and . AAAI, page 1352-1358. AAAI Press, (2016)Evaluation of server virtualization technologies for Green IT., , and . SOSE, page 79-84. IEEE Computer Society, (2011)Faceted Search in Business Intelligence on the Cloud., , , , and . GreenCom/iThings/CPScom, page 842-849. IEEE, (2013)HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster., , , and . LISA, page 59-74. USENIX Association, (2013)Special Issue of DASFAA 2018., and . Data Science and Engineering, 3 (4): 291-292 (2018)A Formal Approach to Model SNMP Network Management Systems., and . ICCCN, page 284. IEEE Computer Society, (1995)