Author of the publication

An optimal stopping strategy for opportunistic broadcast channel access.

, , , and . ICC, page 538-543. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reputation-aware Service Selection based on QoS Similarity., , , and . J. Networks, 6 (7): 950-957 (2011)A Strategy for Selecting Super-Peer in P2P and Grid Based Hybrid System., , , and . Edutainment, volume 5093 of Lecture Notes in Computer Science, page 192-199. Springer, (2008)Semantic access control for cloud computing based on e-Healthcare., , , and . CSCWD, page 512-518. IEEE, (2012)一种基于节点移动倾向检测的社会网络机会转发机制 (Opportunistic Forwarding Mechanism Based on Node Movement Tendencies Detecting)., , and . 计算机科学, 44 (7): 74-78 (2017)Construction of an international digital sharing platform of Dongba manuscripts and Dongba hieroglyphs., , , , , , , and . Comput. Syst. Sci. Eng., (2019)A Comprehensive Review of Vision-Based 3D Reconstruction Methods., , , , and . Sensors, 24 (7): 2314 (April 2024)An optimal stopping strategy for opportunistic broadcast channel access., , , and . ICC, page 538-543. IEEE, (2012)Minimum cost opportunistic routing with intra-session network coding., , , , and . ICC, page 502-507. IEEE, (2014)A Structured P2P System with Match Path and Probability Balance Tree., , and . IMSCCS (2), page 167-174. IEEE Computer Society, (2006)0-7695-2581-4.A centrality estimation method based on Hidden Markov Model in social Delay Tolerant Networks., , , and . WOCC, page 333-337. IEEE, (2013)