Author of the publication

Cross-Layer Resource Management in Software Defined Ultra Dense Wireless Networks.

, , , , and . MSN, page 412-416. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Monitoring Method Based on FBG for Concrete Corrosion Cracking., , , , , and . Sensors, 16 (7): 1093 (2016)Towards an Ontology of Biomodelling., , and . CMSB, volume 7605 of Lecture Notes in Computer Science, page 390-393. Springer, (2012)A multiscale approach to modelling planar cell polarity in Drosophila wing using hierarchically coloured Petri nets., , , , and . CMSB, page 209-218. ACM, (2011)Mapping method between image and natural sentence., , and . ISR, page 1-5. IEEE, (2013)Research of Virtual Simulation Experiment Platform for Marine Auxiliary Machinery Based on VR/AR., , , and . CSAE, page 64:1-64:5. ACM, (2019)A Fast Local Image Descriptor Based on Patch Quantization., , , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 64-75. Springer, (2017)A Dual Decomposition Method for Hierarchical Traffic Control in Inter-DC WANs., , , and . ICCC, page 310-315. IEEE, (2019)Robust adaptive fuzzy control design for nearspace vehicle., , , , and . J. Intell. Fuzzy Syst., 29 (6): 2505-2511 (2015)K-PSO: An improved PSO-based container scheduling algorithm for big data applications., , , , , and . Int. J. Netw. Manag., (2021)Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy., , , , , and . CSAI, page 91-98. ACM, (2023)