Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of CLIPS Expert System to Malware Detection System., , , and . CIS (1), page 309-314. IEEE Computer Society, (2008)Estimation of System Power Consumption on Mobile Computing Devices., , and . CIS, page 1058-1061. IEEE Computer Society, (2007)Copyright protection in named data networking., , , , and . WCSP, page 1-6. IEEE, (2014)A security privacy protection scheme for data collection of smart meters based on homomorphic encryption., , , , , and . EUROCON, page 1401-1405. IEEE, (2013)Jointly Video Bitrate Adaptation and Multicast Resource Allocation in Mobile Edge Networks., , , , and . MSN, page 252-259. IEEE, (2020)f-NDN: An Extended Architecture of NDN Supporting Flow Transmission Mode., , , , , and . IEEE Trans. Commun., 68 (10): 6359-6373 (2020)Cache Pricing Mechanism for ICN in the Scenario of Multiple Content Providers., , , , , and . GLOBECOM, page 2110-2115. IEEE, (2022)A Markov Game Theory-Based Risk Assessment Model for Network Information System., , , and . CSSE (3), page 1057-1061. IEEE Computer Society, (2008)978-0-7695-3336-0.Joint Upload-Download Transmission Scheme for Low-Latency Mobile Live Video Streaming., , , , , and . IWQoS, page 1-10. IEEE, (2023)Scheduling of Distributed Collaborative Tasks on NDN based MANET., , , , and . MAGESys@SIGCOMM, page 36-42. ACM, (2019)