Author of the publication

Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing.

, , , , , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 184-199. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L2-Lq reconstruction model for computational spectrometer., , , and . Appl. Math. Lett., (2023)Synchrosqueezing an effective method for analyzing Doppler radar physiological signals., , , , and . EMBC, page 263-266. IEEE, (2016)Wrist-worn heartbeat monitoring system based on bio-impedance analysis., , , , , , and . EMBC, page 6294-6297. IEEE, (2016)Document similarity analysis via involving both explicit and implicit semantic couplings., , , , and . DSAA, page 1-10. IEEE, (2015)Mobile localization method based on multidimensional similarity analysis cellular radio applications., , , , , and . ICASSP (4), page 1081-1084. IEEE, (2005)Learning to Solve a Rubik's Cube with a Dexterous Hand., , , , and . ROBIO, page 1387-1393. IEEE, (2019)Explore K-Anycast information dissemination in mobile opportunistic networks., , and . WCNC, page 1-6. IEEE, (2016)Neighbor discovery latency in bluetooth low energy networks., , and . Wireless Networks, 26 (3): 1773-1780 (2020)Adaptive Update Workload Reduction for Moving Objects in Road Networks., , , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 216-221. Springer, (2012)Towards Efficient Provable Data Possession., and . IACR Cryptology ePrint Archive, (2011)