Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of Resource Scheduling Mechanisms Based on Software Defined Security., , , and . CyberC, page 372-376. IEEE, (2016)Application of Neural Networks for Predicting UTC Local Time-Scale With Clock Ensemble., , , , , and . IEEE Trans. Instrum. Meas., (2023)A Security Management Architecture for Time Synchronization Towards High Precision Networks., , , , , and . IEEE Access, (2021)Extending SDN network with recursive architecture., , , , and . WPMC, page 491-496. IEEE, (2014)Performance Evaluation of Integrated Multi-Access Edge Computing and Fiber-Wireless Access Networks., , , , and . IEEE Access, (2018)Reversible Room Temperature H2 Gas Sensing Based on Self-Assembled Cobalt Oxysulfide., , , , , , , , , and 1 other author(s). Sensors, 22 (1): 303 (2022)Time-Aware Traffic Scheduling with Virtual Queues in Time-Sensitive Networking., , , , and . IM, page 604-607. IEEE, (2021)Constructing scale-free topologies for low delay of 5G., , , , , and . PIMRC, page 1-6. IEEE, (2017)High-speed architectures for GHASH based on efficient bit-parallel multipliers., , , and . WCNIS, page 582-586. IEEE, (2010)Study on Preliminary Performance of Algorithms for Network Traffic Identification., , , and . CSSE (1), page 629-633. IEEE Computer Society, (2008)