Author of the publication

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.

, , , , and . MASS, page 445-446. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Deep Neural Network Pruning-Taxonomy, Comparison, Analysis, and Recommendations, , and . (August 2023)cite arxiv:2308.06767.The Design and Implementation of A Cost-effective RFID Indoor Localization System., , , , and . CSAR@SenSys, page 1-6. ACM, (2015)Gas Sensor Drift Compensation by an Optimal Linear Transformation., , , , and . BigCom, page 193-199. IEEE Computer Society, (2017)MINI-LLM: Memory-Efficient Structured Pruning for Large Language Models., , and . CoRR, (2024)Modeling and analysis of passive worm propagation in the P2P file-sharing network., , , , and . Simul. Model. Pract. Theory, (2015)An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation., , , and . ER, volume 9974 of Lecture Notes in Computer Science, page 248-259. (2016)Efficient Modeling of Spam Images., , , and . IITSI, page 663-666. IEEE Computer Society, (2010)A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners., , , , and . CSCloud, page 317-322. IEEE Computer Society, (2015)A Range-Free Localization of Passive RFID Tags Using Mobile Readers., , , , and . MASS, page 445-446. IEEE Computer Society, (2015)Long-short interest network with graph-based method for sequential recommendation., , , and . Int. J. Mach. Learn. Cybern., 15 (8): 3143-3155 (August 2024)