Author of the publication

Application-Aware Virtual Machine Placement in Data Centers.

, , , and . IMIS, page 191-196. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Next generation mobility management., , , and . Wireless Communications and Mobile Computing, 11 (4): 443-445 (2011)Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution., , , , , and . Mathematical and Computer Modelling, 58 (5-6): 1328-1339 (2013)Information Security., and . J. UCS, 19 (16): 2347-2348 (2013)Secure ubiquitous computing., , , and . Pervasive and Mobile Computing, (2015)ACSP: A novel security protocol against counting attack for UHF RFID systems., , , and . Computers & Mathematics with Applications, 63 (2): 492-500 (2012)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mobile Information Systems, 6 (1): 65-83 (2010)Mobile and Wireless Networks., and . Mobile Information Systems, 6 (1): 1-3 (2010)Maintaining strong consistency for the identifier-to-locator mapping cache., , , , and . GLOBECOM Workshops, page 986-991. IEEE, (2012)An exploration of cache collaboration in information-centric network., , , and . Int. J. Communication Systems, 27 (9): 1243-1267 (2014)Opportunistic sharing scheme for spectrum allocation in wireless virtualization., , , , , and . Soft Comput., 18 (9): 1685-1696 (2014)