Author of the publication

Proactive content caching by exploiting transfer learning for mobile edge computing.

, , , and . Int. J. Commun. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characteristic research on an accelerated sensor based on GaAs/AlGaAs/InGaAs PHEMT., , , , and . NEMS, page 417-420. IEEE, (2010)Detecting Review Spammer Groups via Bipartite Graph Projection., , , , and . Comput. J., 59 (6): 861-874 (2016)A Kernel-Based Neural Network Test for High-dimensional Sequencing Data Analysis., , and . CoRR, (2023)Exploring Evaluation Factors and Framework for the Object of Automated Trading System., , , , and . HICSS, page 1-10. ScholarSpace, (2019)Individual Trust Development in Business Virtual Teams: An Experimental Study., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language., , and . 3PGCIC, page 487-491. IEEE Computer Society, (2014)The Mapping Between Hand Motion States Induced by Arm Operation and Surface Electromyography., , , and . HCI (6), volume 10906 of Lecture Notes in Computer Science, page 317-329. Springer, (2018)A high throughput geocomputing system for remote sensing quantitative retrieval and a case study., , , , , , , , , and 2 other author(s). Int. J. Appl. Earth Obs. Geoinformation, 13 (6): 902-911 (2011)Intercomparison and combination of satellite retrieved aerosol optical depth over land., , , , , , and . IGARSS, page 3292-3295. IEEE, (2011)Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing., , and . Inf. Manag., 58 (6): 103450 (2021)