Author of the publication

Risk-aware Online Optimization of Cross-Layer Resource Allocation in Next-Generation WLANs.

, , , and . ICCC, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive neural control design for a class of perturbed nonlinear time-varying delay and input delay systems., , , and . ICMLC, page 1168-1173. IEEE, (2011)Non-Destructive Damage Detection of Spacecraft Thermal Protection System with ISAR Imaging., , , and . IGARSS, page 3386-3388. IEEE, (2022)A class of Cantor sets associated with the regular continued fractions., , and . Comput. Math. Appl., 61 (8): 2251-2255 (2011)Leaf Clustering Based on Sparse Subspace Clustering., , , , and . ICIC (2), volume 9772 of Lecture Notes in Computer Science, page 55-66. Springer, (2016)Similarity Matrix Construction Methods in Sparse Subspace Clustering Algorithm for Hyperspectral Imagery Clustering., , , , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 695-700. Springer, (2017)Factor Analysis Based Anomaly Detection., and . IAW, page 108-115. IEEE, (2003)Model-Driven Software Development, , and . chapter Generic and Domain-Specific Model Refactoring Using a Model Transformation Engine, page 199-217. Springer Berlin Heidelberg, (2005)Region of Interest Detection Based on Visual Perception Model., , and . IJPRAI, (2012)Based on the Queuing Model of CAN Bus Simulation and Application., and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 631-639. Springer, (2013)Business Value of Enterprise Micro-Blogs: Empirical Study from weibo.com in Sina., , , and . PACIS, page 62. (2013)