Author of the publication

Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks.

, and . ICC, page 3215-3219. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

First-principles study of binary special quasirandom structures for the Al-Cu, Al-Si, Cu-Si, and Mg-Si systems, , , , , , , , , and . Calphad, 33 (4): 769 - 773 (2009)Frequency domain simultaneous algebraic reconstruction techniques: algorithm and convergence., and . Computational Imaging, volume 5674 of SPIE Proceedings, page 344-353. SPIE, (2005)Prediction Model of Sulfur Deposition in the High Sulfur Gas Well Bore., , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 439-446. (2009)Simultaneous Block Iterative Reconstruction with Pre- and Post- Backprojection Filters., and . ICIP, page 909-912. IEEE, (2006)Dynamic Graph Link Prediction by Semantic Evolution., , , , , and . ICC, page 1-6. IEEE, (2019)A piecewise parametric method based on polynomial phase model to compensate ionospheric phase contamination., , and . ICASSP (2), page 405-408. IEEE, (2003)Managing Multi-Hazards Risk of Urban Deprivation in the Context of Urban Planning and Design.. IGARSS, page 2118-2121. IEEE, (2021)Weakly Supervised Object Localization via Transformer with Implicit Spatial Calibration., , , and . ECCV (9), volume 13669 of Lecture Notes in Computer Science, page 612-628. Springer, (2022)TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors., , , , , and . CSCWD, page 174-179. IEEE, (2021)Seq2Set2Seq: A Two-stage Disentangled Method for Reply Keyword Generation in Social Media., , , , , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 23 (3): 41 (March 2024)