Author of the publication

Distributed cooperative location estimation (D-COOLEST) in wireless environments.

, , , , , and . ICT, page 872-878. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Copyright Protection Application Based on Blockchain Technology., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1271-1274. IEEE, (2019)Optimal relay selection with non-negligible probing time., , and . ICC, page 2227-2232. IEEE, (2015)Multi-level trajectory modeling for video copy detection., , , , , and . ICASSP, page 2378-2381. IEEE, (2010)Distributed cooperative location estimation (D-COOLEST) in wireless environments., , , , , and . ICT, page 872-878. IEEE, (2010)A class of quadratic forms and the associated few-weight codes., , and . Discret. Math., 346 (12): 113640 (December 2023)Reconnaissance for Reinforcement Learning with Safety Constraints., , , , , and . ECML/PKDD (2), volume 12976 of Lecture Notes in Computer Science, page 567-582. Springer, (2021)Spatial Community-Informed Evolving Graphs for Demand Prediction., , , , , and . ECML/PKDD (5), volume 12461 of Lecture Notes in Computer Science, page 440-456. Springer, (2020)MetaProfiling: Inferring User Profiles with Few-Shot Data., , , , , , , and . HPCC/DSS/SmartCity/DependSys, page 2404-2409. IEEE, (2021)Optimal local and remote controllers with unreliable communication: the infinite horizon case., , and . ACC, page 6634-6639. IEEE, (2018)Source location privacy against laptop-class attacks in sensor networks., , , , and . SecureComm, page 5. ACM, (2008)