Author of the publication

Spatial and Temporal Contextual Multi-Armed Bandit Handovers in Ultra-Dense mmWave Cellular Networks.

, , and . IEEE Trans. Mob. Comput., 20 (12): 3423-3438 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaos analysis of the electrical signal time series evoked by acupuncture, , , and . Chaos, Solitons & Fractals, 33 (3): 901--907 (August 2007)Cooperative communications with relay selection in wireless sensor networks., , , and . IEEE Trans. Consumer Electronics, 55 (2): 513-517 (2009)Exploiting Fountain Codes for Secure Wireless Delivery., , , , and . IEEE Communications Letters, 18 (5): 777-780 (2014)Systems biology: The cost of feedback control, and . Nature, 467 (7312): 163--164 (Sep 9, 2010)Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback., and . IEEE Trans. Vehicular Technology, 68 (1): 740-753 (2019)information to Intelligence(itoI): An Adaptive and Intelligent Prototype of Knowledge Construction for College Student., , , , , , and . ICCSE, page 2:1-2:4. ACM, (2018)Study on Medical Image Report Generation Based on Improved Encoding-Decoding Method., , , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 686-696. Springer, (2019)Interference Mitigation via CECRS Precoding in a Two-Tier Heterogeneous Network with Cooperative Femtocells., , , and . VTC Fall, page 1-5. IEEE, (2014)Learning Monocular Visual Odometry with Dense 3D Mapping from Dense 3D Flow., , , , and . IROS, page 6864-6871. IEEE, (2018)Security protection over wireless fading channels by exploiting frequency selectivity., , , and . WCSP, page 1-5. IEEE, (2016)