Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative monitoring BGP among autonomous systems., , and . Security and Communication Networks, 8 (10): 1943-1957 (2015)A Novel Resource Allocation Heuristic for a Power Constrained Data Center., , , , and . NBiS, page 255-260. IEEE Computer Society, (2013)Retention-Aware Test Scheduling for BISTed Embedded SRAMs., , and . European Test Symposium, page 83-88. IEEE Computer Society, (2006)Detection Network Anomalies Based on Packet and Flow Analysis., , , and . ICN, page 497-502. IEEE Computer Society, (2008)An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center., , , and . TrustCom/ISPA/IUCC, page 1471-1477. IEEE Computer Society, (2013)SDBGP: A scalable, distributed BGP routing protocol implementation., , , , and . HPSR, page 191-196. IEEE, (2011)Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks., , , , , and . IEEE/ACM Trans. Netw., 22 (3): 889-902 (2014)VR-Cluster: Dynamic Migration for Resource Fragmentation Problem in Virtual Router Platform., , and . Scientific Programming, (2016)The New Progress in the Research of Binary Vulnerability Exploits., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 277-286. Springer, (2018)Methodologies and Algorithms for Testing Switch-Based NoC Interconnects., , , , and . DFT, page 238-246. IEEE Computer Society, (2005)