Author of the publication

Mobile cloud computing in 5G: Emerging trends, issues, and challenges Guest Editorial.

, , , and . IEEE Netw., 29 (2): 4-5 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPU., and . ComComAP, page 50-55. IEEE, (2014)Routing protocols for underwater wireless sensor networks., , , , and . IEEE Communications Magazine, 53 (11): 72-78 (2015)Coordinate Memory Deduplication and Partition for Improving Performance in Cloud Computing., , , , and . IEEE Trans. Cloud Computing, 7 (2): 357-368 (2019)A Novel DOA Estimation Algorithm Using Array Rotation Technique., , , and . Future Internet, 6 (1): 155-170 (2014)Distributed Middleware of Large-Scale Wireless Networks., , , , and . IJDSN, (2013)Wireless Sensor Networks in IPv4/IPv6 Transition Scenarios., , , and . Wireless Personal Communications, 78 (4): 1849-1862 (2014)Improvement of Detection and Localization Performance Using the Receiving Array Response Difference Between Ocean Noise and Signal in Shallow Water., , , , and . IEEE Access, (2019)A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks., , , , and . GreeNets, volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2011)An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network., , , and . IEEE Trans. Mob. Comput., 14 (12): 2447-2459 (2015)Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks., , , , and . Comput. J., 58 (6): 1280-1292 (2015)