Author of the publication

Using Traditional Data Analysis Algorithms to Detect Access Patterns for Massive Data Processing.

, , , , and . HPCC/EUC, page 1097-1104. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Progress and outlook for STT-MRAM., , , , , and . ICCAD, page 235. IEEE Computer Society, (2011)A taxonomy and survey on autonomic management of applications in grid computing environments., , , and . Concurrency and Computation: Practice and Experience, 23 (16): 1990-2019 (2011)Semantic analysis and retrieval of spatial data based on the uncertain ontology model in Digital Earth., , , and . Int. J. Digital Earth, 8 (1): 1-14 (2015)A Simulation Study on Urban Water Threat Detection in Modern Cyberinfrastructures., , , and . IPDPS Workshops, page 1040-1047. IEEE Computer Society, (2012)Metrics for BPEL Process Reusability Analysis in a Workflow System., , , , and . IEEE Systems Journal, 10 (1): 36-45 (2016)Visual Analytics Ontology-Guided I-DE System: A Case Study of Head and Neck Cancer in Australia., , , , , and . CIC, page 424-429. IEEE Computer Society, (2018)A Holistic Evaluation of Docker Containers for Interfering Microservices., , , , , and . SCC, page 33-40. IEEE, (2018)Cloud monitoring for optimizing the QoS of hosted applications., , , , and . CloudCom, page 765-770. IEEE Computer Society, (2012)End-to-End Service Level Agreement Specification for IoT Applications., , , , and . HPCS, page 926-935. IEEE, (2018)Energy-efficient VM-placement in cloud data center., , , , , , and . SUSCOM, (2018)