Author of the publication

Unifying Models of Churn and Resilience for Unstructured P2P Graphs.

, , , and . IEEE Trans. Parallel Distributed Syst., 25 (9): 2475-2485 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-Complexity Energy-Efficient Power Allocation With Buffer Constraint in HSR Communications., , , and . IEEE Access, (2019)Prediction Method of Concentricity and Perpendicularity of Aero Engine Multistage Rotors Based on PSO-BP Neural Network., , , , , and . IEEE Access, (2019)Three-Dimensional Integrated Guidance and Control for a STT Missile Based on Improved RISE in Series., , , , and . IEEE Access, (2019)Wealth-Based Evolution Model for the Internet AS-Level Topology., and . INFOCOM, IEEE, (2006)Authentication scheme based on smart card in multi-server environment., , and . Wireless Networks, 26 (2): 855-863 (2020)Variable selection via combined penalization for high-dimensional data analysis., , and . Comput. Stat. Data Anal., 54 (10): 2230-2243 (2010)Signal Detection in Uplink Pilot-Assisted Multi-User MIMO Systems with Deep Learning., , and . ComComAP, page 369-373. IEEE, (2019)Fuzzy Random Expected Value Model based Multi-objective Optimization Routing for Wireless Sensor Networks., and . QLSC, volume 5 of World Scientific Proceedings Series on Computer Engineering and Informtion Science, World Scientific, (2012)Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control., , and . Commun. Nonlinear Sci. Numer. Simul., 22 (Issues): 747-768 (2015)An Efficient Context-Aware Privacy Preserving Approach for Smartphones., , , , , and . Secur. Commun. Networks, (2017)