From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A novel trusted third party based signcryption scheme., , и . Multim. Tools Appl., 79 (31-32): 22749-22769 (2020)Fault tolerant deployment and topology control in wireless ad hoc networks., , , и . Wirel. Commun. Mob. Comput., 4 (1): 109-125 (2004)Back-Guard: Wireless Backscattering based User Activity Recognition and Identification with Parallel Attention Model., , , , и . IWQoS, стр. 1-10. IEEE, (2020)Regional Gossip Routing for Wireless Ad Hoc Networks., , и . Mob. Networks Appl., 10 (1-2): 61-77 (2005)LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks., , , , и . IEEE Trans. Parallel Distributed Syst., 26 (1): 174-184 (2015)Efficient Distributed Low-Cost Backbone Formation for Wireless Networks., , и . IEEE Trans. Parallel Distributed Syst., 17 (7): 681-693 (2006)Online Deadline-Aware Task Dispatching and Scheduling in Edge Computing., , , , и . IEEE Trans. Parallel Distributed Syst., 31 (6): 1270-1286 (2020)Simultaneous Refinement and Coarsening for Adaptive Meshing., , и . Eng. Comput., 15 (3): 280-291 (1999)Average Case Analysis for Tree Labelling Schemes., , и . ISAAC, том 3827 из Lecture Notes in Computer Science, стр. 136-145. Springer, (2005)iLight: device-free passive tracking by wireless sensor networks., , , и . SenSys, стр. 315-316. ACM, (2009)