Author of the publication

Handling scheduling uncertainties through traffic shaping in Time-Triggered train networks.

, , , , , and . IWQoS, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large-Scale Cross-Modality Search via Collective Matrix Factorization Hashing., , , and . IEEE Trans. Image Processing, 25 (11): 5427-5440 (2016)Handling scheduling uncertainties through traffic shaping in Time-Triggered train networks., , , , , and . IWQoS, page 1-6. IEEE, (2017)Channel and traffic status aware relay selection and traffic queue analysis in wireless user-relaying networks., , , and . WTS, page 1-5. IEEE, (2012)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)Stereotime: a wireless 2D and 3D switchable video communication system., , , , , , , and . ACM Multimedia, page 473-474. ACM, (2013)Sparse Representation for Wireless Communications: A Compressive Sensing Approach., , , , and . IEEE Signal Process. Mag., 35 (3): 40-58 (2018)An adaptive coupling method for exterior anisotropic elliptic problems., , and . Appl. Math. Comput., (2016)Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing., , and . IEEE Trans. Signal Process., 66 (1): 5-17 (2018)View-Based 3D Object Retrieval: Challenges and Approaches., and . IEEE Multim., 21 (3): 52-57 (2014)Geographical Retagging., , , and . MMM (2), volume 7733 of Lecture Notes in Computer Science, page 47-57. Springer, (2013)