Author of the publication

基于网络编码的拓扑推断研究综述 (Network Coding Based Topology Inference: A Survey).

, , , and . 计算机科学, 43 (Z6): 242-248 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Allocation in Cognitive Radio-Enabled UAV Communication., , , and . IEEE Trans. Cogn. Commun. Netw., 8 (1): 296-310 (2022)Uplink Resource Allocation in Energy Harvesting Cellular Network With H2H/M2M Coexistence., , , and . IEEE Trans. Wirel. Commun., 19 (8): 5101-5116 (2020)Performance Analysis of LTE Random Access Protocol With an Energy Harvesting M2M Scenario., , , and . IEEE Internet of Things Journal, 7 (2): 893-905 (2020)Joint Channel Assignment and Occupancy Time Optimization in Frame-Based Listen-Before-Talk., , , and . IEEE Communications Letters, 24 (3): 695-699 (2020)一种基于复数域网络编码的双层卫星通信系统 (Double-layer Satellite Communication System Based on Complex Field Network Coding)., , , and . 计算机科学, 43 (10): 114-119 (2016)基于网络编码的拓扑推断研究综述 (Network Coding Based Topology Inference: A Survey)., , , and . 计算机科学, 43 (Z6): 242-248 (2016)Increasing Ethene Yield via Oxidative Coupling of Methane at Low Temperature: An Application of Machine Learning and DFT in the Design and Innovation of Effective Catalyst Compositions., , and . CCECE, page 342-347. IEEE, (2023)Efficient combination of polynomial time algorithm and subtree decomposition for network coding., and . IET Commun., 9 (17): 2147-2152 (2015)Security against passive attacks on network coding system - A survey., and . Comput. Networks, (2018)The Full ESWAN Destination-Based Approach: Operations And Evaluation., and . Afr. J. Inf. Commun. Technol., (2007)