Author of the publication

Energy Efficiency Based Joint Computation Offloading and Resource Allocation in Multi-Access MEC Systems.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement Strategies of Pupils' Self-Efficacy in Smart Learning Environment - A Case Study., , , , , and . ICBL, volume 9757 of Lecture Notes in Computer Science, page 246-257. Springer, (2016)Relationships Among Online Teaching Design, Experience, and Perception of College Teachers During the Pandemic., , and . ICBL, volume 12830 of Lecture Notes in Computer Science, page 351-366. Springer, (2021)Five Forces Model of Computational Power: A Comprehensive Measure Method., , , , and . KSII Trans. Internet Inf. Syst., 16 (7): 2239-2256 (2022)Energy Efficiency Based Joint Computation Offloading and Resource Allocation in Multi-Access MEC Systems., , , and . IEEE Access, (2019)PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems., , , , , , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-19 (February 2023)Construction of the 3L5G Task-Driven Instructional Model: Fostering Computational Thinking of Junior High School Students in an Application Software Course., and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 177-186. Springer, (2017)The use and effects of incentive systems on learning and performance in educational games., , , , , , and . Comput. Educ., (2021)Elastic Weight Consolidation Continual Learning Based Signal Detection in Multiple Channel MIMO System., , , , and . ICCC, page 534-539. IEEE, (2021)Hierarchical Key Management Scheme with Multilevel Secure Access., , , and . CyberC, page 97-102. IEEE, (2019)Enhanced blockchain based key management scheme against key exposure attack., , , and . AIIPCC, page 68:1-68:6. ACM, (2019)