Author of the publication

Resilient Service Provisioning for Edge Computing.

, , , , , , and . IEEE Internet Things J., 10 (3): 2255-2271 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaching the Normal Approximation of the Finite Blocklength Capacity Within 0.025 dB by Short Polar Codes., , , and . IEEE Wirel. Commun. Lett., 9 (7): 1089-1092 (2020)Polar-Slotted ALOHA Over Slot Erasure Channel., , , and . IEEE Trans. Veh. Technol., 72 (1): 760-771 (2023)An Underwater Side-Scan Sonar Transfer Recognition Method Based on Crossed Point-to-Point Second-Order Self-Attention Mechanism., , , , , and . Remote. Sens., 15 (18): 4517 (September 2023)Detection of active eavesdropper using source enumeration method in massive MIMO., , , and . ICC, page 1-5. IEEE, (2017)Performance analysis of polar codes based on 3 × 3 kernel matrix., , , and . ChinaCom, page 382-386. IEEE Computer Society, (2015)Design of polar coding for GFDM system., , , and . PIMRC, page 1-6. IEEE, (2017)A Novel Two-Stage Compression Scheme Combining Polar Coding and Linear Prediction Coding for Fronthaul Links in Cloud-RAN., , , , and . IEICE Trans. Commun., 100-B (5): 691-701 (2017)Inferring event geolocation based on Twitter., , , , and . ICIMCS, page 26:1-26:5. ACM, (2018)An Improved Compound Gradient Vector Based Neural Network On-Line Training Algorithm., , , and . IEA/AIE, volume 2718 of Lecture Notes in Computer Science, page 316-325. Springer, (2003)A practical topology control method for smartphone based ad hoc networks experiment., , , and . WCSP, page 1-5. IEEE, (2016)