Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An SRP-based energy-efficient scheduling algorithm for dependent real-time tasks., and . Int. J. Embed. Syst., 6 (4): 335-350 (2014)Quantifying Einstein-Podolsky-Rosen steering and expanding the scope of steerability of the two qubit state., , and . ICSAI, page 1165-1169. IEEE, (2016)Research on On-card Bytecode Verifier for Java Cards., , , and . J. Comput., 4 (6): 502-509 (2009)Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment., , , and . J. Networks, 7 (9): 1341-1348 (2012)A temporal error concealment method for H.264/AVC using motion vector recovery., , and . IEEE Trans. Consumer Electronics, 54 (4): 1880-1885 (2008)From Wechat to we Fight: Tencent and China Mobile's Dilemma., and . PACIS, page 265. (2014)Nonlinear time series modeling and prediction using functional weights wavelet neural network-based state-dependent AR model., , and . Neurocomputing, (2012)A Novel Airbnb Matching Scheme in Shared Economy Using Confidence and Prediction Uncertainty Analysis., , , , and . IEEE Access, (2018)Fair Scheduling in Resonant Beam Charging for IoT Devices., , , , and . CoRR, (2018)Two-Stage Heuristic Algorithm for a New Model of Hazardous Material Multi-depot Vehicle Routing Problem., , , , and . UKCI, volume 650 of Advances in Intelligent Systems and Computing, page 362-366. Springer, (2017)