Author of the publication

Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing.

, , , , , and . FAS*W@SASO/ICCAC, page 66-71. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSMC: A Novel Distributed Store-Retrieve Approach of Internet Data Using MapReduce Model and Community Detection in Big Data., , , , and . IJDSN, (2014)A Cooperative Differential Game Model for Multiuser Rate-Based Flow Control., , , and . Wireless Personal Communications, 72 (2): 1173-1186 (2013)A wisdom rate allocation scheme in wireless networks., , , and . Oper. Res. Lett., 41 (4): 377-380 (2013)VirusFinder: A Web-Based Virus Identification System Using Viral Nucleotide Signatures., , and . CSB, page 652-653. IEEE Computer Society, (2004)A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment., , , , , and . IEEE Trans. Parallel Distrib. Syst., 27 (2): 305-316 (2016)A Survey on Data Migration Management in Cloud Environment., , , , and . JDIM, 10 (5): 324-331 (2012)A 'Joint-Me' Task Deployment Strategy for Load Balancing in Edge Computing., , , , and . IEEE Access, (2019)A three-stage online map-matching algorithm by fully using vehicle heading direction., , , and . J. Ambient Intelligence and Humanized Computing, 9 (5): 1623-1633 (2018)Research on Linux Trusted Boot Method Based on Reverse Integrity Verification., , , , , and . Scientific Programming, (2016)Towards Trusted Result Verification in Mass Data Processing Service., , , , and . IEICE Transactions, 97-B (1): 19-28 (2014)