Author of the publication

Deep Reinforcement Learning Approaches for Content Caching in Cache-Enabled D2D Networks.

, , , , , , and . IEEE Internet Things J., 7 (1): 544-557 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional optimization for approximate near-threshold computing., , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (10): 1426-1441 (2020)Multispectral image compression methods for improvement of both colorimetric and spectral accuracy., , , and . J. Electronic Imaging, 25 (4): 043026 (2016)A SIFT-based mean shift algorithm for moving vehicle tracking., , , , and . Intelligent Vehicles Symposium, page 762-767. IEEE, (2014)3D head pose estimation with convolutional neural network trained on synthetic images., , , , and . ICIP, page 1289-1293. IEEE, (2016)OPC UA-Based Smart Manufacturing: System Architecture, Implementation, and Execution., , , , , , , , and . ES, page 281-286. IEEE, (2017)An effective trajectory optimization method for robotic belt grinding based on intelligent algorithm., , , , , and . ROBIO, page 1142-1147. IEEE, (2010)Memory efficient and high performance key-value store on FPGA using Cuckoo hashing., , , and . FPL, page 1-4. IEEE, (2016)Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network., , , and . J. Sensors, (2015)Characteristics of ESD protection devices operated under elevated temperatures., , , , , , and . Microelectron. Reliab., (2016)An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 421-431. (2016)