Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A wisdom rate allocation scheme in wireless networks., , , and . Oper. Res. Lett., 41 (4): 377-380 (2013)A Cooperative Differential Game Model for Multiuser Rate-Based Flow Control., , , and . Wireless Personal Communications, 72 (2): 1173-1186 (2013)Research on Linux Trusted Boot Method Based on Reverse Integrity Verification., , , , , and . Sci. Program., (2016)Linear Stability of Incompressible Flow Using a Mixed Finite Element Method, and . Journal of Computational Physics, 139 (2): 243 - 273 (1998)Towards Trusted Result Verification in Mass Data Processing Service., , , , and . IEICE Trans. Commun., 97-B (1): 19-28 (2014)Deep forest auto-Encoder for resource-Centric attributes graph embedding., , , and . Pattern Recognit., (November 2023)An Overview of Deep Learning Approaches in Chest Radiograph., , , , , , , and . IEEE Access, (2020)A 'Joint-Me' Task Deployment Strategy for Load Balancing in Edge Computing., , , , and . IEEE Access, (2019)Peer-to-peer video-on-demand with scalable video coding., , , and . Comput. Commun., 33 (14): 1589-1597 (2010)Study and Implementation of 600-V High-Voltage Gate Driver IC With the Common-Mode Dual-Interlock Technique for GaN Devices., , , , , , , , , and 2 other author(s). IEEE Trans. Ind. Electron., 68 (2): 1506-1514 (2021)