Author of the publication

Bidding Strategies in QoS-Aware Cloud Systems Based on N-Armed Bandit Problems.

, , , and . NCCA, page 38-45. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput-Optimal Cross-Layer Design for Cognitive Radio Ad Hoc Networks., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (9): 2599-2609 (2015)Efficient Operator Placement for Distributed Data Stream Processing Applications., , , and . IEEE Trans. Parallel Distrib. Syst., 30 (8): 1753-1767 (2019)Network tomography on general topologies., , , and . SIGMETRICS, page 21-30. ACM, (2002)Joint Operator Replication and Placement Optimization for Distributed Streaming Applications., , , and . VALUETOOLS, ACM, (2016)Towards Self-adaptation for Dependable Service-Oriented Systems., , , , and . WADS, volume 5835 of Lecture Notes in Computer Science, page 24-48. Springer, (2008)Explicit Loss Inference in Multicast Tomography., , , and . IEEE Trans. Information Theory, 52 (8): 3852-3855 (2006)Markov analysis of the PRMA protocol for local wireless networks., and . Wireless Networks, 4 (4): 297-306 (1998)Bidding Strategies in QoS-Aware Cloud Systems Based on N-Armed Bandit Problems., , , and . NCCA, page 38-45. IEEE Computer Society, (2014)A Multi-level Elasticity Framework for Distributed Data Stream Processing., , , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 53-64. Springer, (2018)A General Model for Virtual Machines Resources Allocation in Multi-tier Distributed Systems., and . ICAS, page 162-167. IEEE Computer Society, (2009)