Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph theory based mobile network insight analysis framework., , and . UEMCON, page 1-7. IEEE, (2016)On joint protection/restoration in IP-centric DWDM-based optical transport networks., , and . IEEE Commun. Mag., 38 (6): 174-183 (2000)Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks., , and . IET Inf. Secur., 1 (4): 152-162 (2007)A Deep Learning Approach on Building Detection from Unmanned Aerial Vehicle-Based Images in Riverbank Monitoring., , , , , and . Sensors, 18 (11): 3921 (2018)An agent-based traffic grooming and management mechanism for IP over optical networks., , , and . ICCCN, page 425-430. IEEE, (2002)Delay analysis of ethernet passive optical networks with quasi-leaved polling and gated service scheme., , and . AccessNets, page 1-8. IEEE, (2007)Support of QoS in IP-based Ethernet-PON., , and . GLOBECOM, page 3737-3741. IEEE, (2003)Enabling local breakout from eNB in LTE networks., , , and . ICC, page 6982-6986. IEEE, (2012)A hybrid distributed fault-management protocol for combating single-fiber failures in mesh-based DWDM optical networks., , , , and . GLOBECOM, page 2676-2680. IEEE, (2002)Does the Use of WeChat Lead to Subjective Well-Being?: The Effect of Use Intensity and Motivations., , and . Cyberpsy., Behavior, and Soc. Networking, 19 (10): 587-592 (2016)