Author of the publication

Characterizing and orchestrating NFV-ready servers for efficient edge data processing.

, , , , , , and . IWQoS, page 22:1-22:10. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Identification and Quantification of Fissured Tongue Diagnosis., , , , , and . BIBM, page 1953-1958. IEEE Computer Society, (2018)On a risk model with stochastic premiums income and dependence between income and loss., and . J. Computational Applied Mathematics, 234 (1): 44-57 (2010)A note on the perturbation analysis for the generalized Cholesky factorization., , and . Applied Mathematics and Computation, 215 (11): 4022-4027 (2010)On a compound Poisson risk model with delayed claims and random incomes., and . Applied Mathematics and Computation, 217 (24): 10195-10204 (2011)The reverse order law for 1, 3, 4-inverse of the product of two matrices., and . Applied Mathematics and Computation, 215 (12): 4293-4303 (2010)NOMA and IDMA in Random Access Systems - Invited Paper., , and . VTC Spring, page 1-5. IEEE, (2018)Automated Inspection of Defects in Optical Fiber Connector End Face Using Novel Morphology Approaches., , , and . Sensors, 18 (5): 1408 (2018)DOA Estimation of Coherent Signals on Coprime Arrays Exploiting Fourth-Order Cumulants., , and . Sensors, 17 (4): 682 (2017)Estimating and Compensating Residual Carrier Frequency Offset for Commodity WiFi., , , and . ICC, page 1-6. IEEE, (2019)Using Support Vector Machine for Classification of Baidu Hot Word., and . KSEM, volume 8041 of Lecture Notes in Computer Science, page 580-590. Springer, (2013)