Author of the publication

Enabling 5G RAN Slicing With EDF Slice Scheduling.

, and . IEEE Trans. Veh. Technol., 68 (3): 2865-2877 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supervisory control reconfiguration and optimization of resource allocation systems with a Petri net and mathematical programming approach., , , and . ICNSC, page 52-57. IEEE, (2012)A behavior analysis based Mobile Malware Defense System., , and . ICSPCS, page 1-6. IEEE, (2012)The Consistency of an Access Control List., , and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 367-373. Springer, (2002)A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction., , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 427-438. Springer, (2017)CRBAR: Cooperative relay-based auto rate MAC for multirate wireless networks., and . IEEE Trans. Wirel. Commun., 8 (12): 5938-5947 (2009)Adaptive fuzzy decentralized control for uncertain large-scale nonlinear time-delay systems with virtual control functions.. Neural Comput. Appl., 28 (5): 1009-1020 (2017)New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems., , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 403-414 (2021)Weakly Secure Symmetric Multilevel Diversity Coding., , , and . IEEE Trans. Inf. Theory, 66 (11): 7033-7055 (2020)多层感知器深度卷积生成对抗网络 (Multi-layer Perceptron Deep Convolutional Generative Adversarial Network)., , and . 计算机科学, 46 (9): 243-249 (2019)BSubLoc: database of protein subcellular localization., , , and . Nucleic Acids Res., 32 (Database-Issue): 122-124 (2004)