Author of the publication

Efficient Data Collection with Spatial Clustering in Time Constraint WSN Applications.

, , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 728-742. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel kind of sufficient conditions for safety judgement based on control barrier function., , and . Sci. China Inf. Sci., (2021)An Online Trend Analysis Method for Measuring Data Based on Historical Data Clustering., , , , , , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 137-145. Springer, (2013)Comparing of feature selection and classification methods on report-based subhealth data., , , , , , , , and . BIBM, page 1356-1358. IEEE Computer Society, (2016)Intelligent Agents in Intrusion Detection of CSCW Systems., , and . CSCWD, page 1001-1004. IEEE, (2006)A Localization-Based Anti-Sensor Network System., , and . INFOCOM, page 2396-2400. IEEE, (2007)The Paradigm of Big Data for Augmenting Internet of Vehicle into the Intelligent Cloud Computing Systems., , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 247-261. Springer, (2014)Exploring an Improved Decision Tree Based Weights., , , , and . ICNC (1), page 139-143. IEEE Computer Society, (2009)The Research on the Algorithm of Nonlinear Support Vector Classification Machine Based on Fuzzy Theory., , and . FSKD (1), page 479-483. IEEE Computer Society, (2008)Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes., , , , and . WCNC, page 942-947. IEEE, (2009)A collaborative trust model of firewall-through based on Cloud Computing., , , , and . CSCWD, page 329-334. IEEE, (2010)