Author of the publication

A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks.

, , , , and . Int. J. Embed. Syst., 11 (4): 440-451 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating., , , , , and . IEEE Internet Things J., 9 (20): 20681-20692 (2022)Virtual network embedding with pre-transformation and incentive convergence mechanism., , , , , and . Concurr. Comput. Pract. Exp., (2017)A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator., , , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 527-536. Springer, (2016)Social networking big data: Opportunities, solutions, and challenges., , and . Future Gener. Comput. Syst., (2018)The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things., , , , , and . IEEE Intell. Syst., 38 (5): 45-55 (September 2023)Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory., , and . ICYCS, page 432-438. IEEE Computer Society, (2008)A Coordinated Two-Stages Virtual Network Embedding Algorithm Based on Reinforcement Learning., , , , , and . CBD, page 43-48. IEEE, (2019)Co-attention Networks for Aspect-Level Sentiment Analysis., , , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 200-209. Springer, (2019)New deep learning method to detect code injection attacks on hybrid applications., , , , and . J. Syst. Softw., (2018)Propagation model of smartphone worms based on semi-Markov process and social relationship graph., , , and . Comput. Secur., (2014)