Author of the publication

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks.

, , , , , and . IEEE Trans. Ind. Informatics, 12 (2): 788-800 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics., , , , , and . IEEE Internet Things J., 6 (3): 5140-5151 (2019)A novel service evolution approach for active services in ubiquitous computing., , , , , , and . Int. J. Commun. Syst., 22 (9): 1123-1151 (2009)Online Multi-Workflow Scheduling under Uncertain Task Execution Time in IaaS Clouds., , , , , , , and . IEEE Trans. Cloud Comput., 9 (3): 1180-1194 (2021)Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks., , , , and . IEEE Trans. Wirel. Commun., 15 (5): 3143-3156 (2016)Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing., , , , and . Inf. Sci., (2020)Beamforming Design for Multiuser uRLLC With Finite Blocklength Transmission., , , , , and . IEEE Trans. Wirel. Commun., 20 (12): 8096-8109 (2021)A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph., , , , , and . J. Univers. Comput. Sci., 15 (12): 2387-2408 (2009)Delay-Optimal Proactive Service Framework for Block-Stream as a Service., , , and . IEEE Wirel. Commun. Lett., 7 (4): 598-601 (2018)A Feasible Fuzzy-Extended Attribute-Based Access Control Technique., , , , , and . Secur. Commun. Networks, (2018)An adaptive and configurable protection framework against android privilege escalation threats., , , and . Future Gener. Comput. Syst., (2019)