Author of the publication

Optimizing resource utilization in private clouds with an opportunistic approach.

, , , and . LatinCloud, page 21-22. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smarter Heuristics for Business-Driven Services Selection in Multi-services P2P Grids., and . IEEE SCC, page 417-424. IEEE Computer Society, (2010)Eva: An Event-Based Framework for Developing Specialized Communication Protocols., , , , and . NCA, page 108-121. IEEE Computer Society, (2001)Scalable Resource Annotation in Peer-to-Peer Grids., , and . Peer-to-Peer Computing, page 231-234. IEEE Computer Society, (2008)A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids., , , , and . Peer-to-Peer Computing, page 193-202. IEEE Computer Society, (2006)Resource demand and supply in BitTorrent content-sharing communities., , , and . Computer Networks, 53 (4): 515-527 (2009)Scheduling in Bag-of-Task Grids: The PAUÁ Case., , , , , , , , , and 1 other author(s). SBAC-PAD, page 124-131. IEEE Computer Society, (2004)Using a file working set model to speed up the recovery of Peer-to-Peer backup systems., , , , and . Operating Systems Review, 42 (6): 64-70 (2008)Energy Efficient Computing through Productivity-Aware Frequency Scaling., , , and . CGC, page 191-198. IEEE Computer Society, (2012)OurGrid: An Approach to Easily Assemble Grids with Equitable Resource Sharing., , , and . JSSPP, volume 2862 of Lecture Notes in Computer Science, page 61-86. Springer, (2003)BitTorrent Needs Psychiatric Guarantees: Quantifying How Vulnerable BitTorrent Swarms are to Sybil Attacks., , and . LADC, page 65-72. IEEE Computer Society, (2009)