Author of the publication

Resource Allocation Method for Network Slicing Using Constrained Reinforcement Learning.

, , and . Networking, page 1-3. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fighting Statistical Re-Identification in Human Trajectory Publication., , and . SIGSPATIAL/GIS, page 82:1-82:4. ACM, (2017)Decentralized Trajectory Tracking Using Homology and Hodge Decomposition in Sensor Networks., , , , , , , and . CoRR, (2017)5G Spectrum: is china ready?, , , , , and . IEEE Commun. Mag., 53 (7): 58-65 (2015)Can Online Learning Increase the Reliability of Extreme Mobility Management?, , , , and . IWQoS, page 1-6. IEEE, (2021)Decentralized human trajectories tracking using hodge decomposition in sensor networks., , , , , , and . SIGSPATIAL/GIS, page 54:1-54:4. ACM, (2015)Understanding and modelling information dissemination patterns in vehicle-to-vehicle networks., , and . SIGSPATIAL/GIS, page 41:1-41:10. ACM, (2015)Analyzing sensitive information leakage in trajectory embedding models., , , , , and . SIGSPATIAL/GIS, page 85:1-85:10. ACM, (2022)AceMap: Knowledge Discovery through Academic Graph., , , , , , , , , and 16 other author(s). CoRR, (2024)Trajectory mining, representation and privacy protection.. SIGSPATIAL PhD Symposium, page 2:1-2:4. ACM, (2015)Disentangled Graph Contrastive Learning for Review-based Recommendation., , , , , , , and . CoRR, (2022)