Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Intelligence: Profiting from Uncertainty in Data Processing System., , , , and . ICPP, page 458-467. IEEE Computer Society, (2013)ASAP: Scalable Identification and Counting for Contactless RFID Systems., , , and . ICDCS, page 52-61. IEEE Computer Society, (2010)Coding Opportunity Aware Backbone metrics for broadcast in wireless networks., , , , and . INFOCOM, page 275-279. IEEE, (2013)面向公共安全数据处理的浪涌模型研究应用 (Data Surge Models for Public Security Data Processing and Its Application in Unity of Security System)., , and . 计算机科学, 44 (Z6): 342-347 (2017)Surface Coverage in Sensor Networks., , , , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 234-243 (2014)Crowdsourcing based social media data analysis of urban emergency events., , , , and . Multim. Tools Appl., 76 (9): 11567-11584 (2017)Measuring the Semantic Relatedness Between Images Using Social Tags., , , and . Int. J. Cogn. Informatics Nat. Intell., 7 (2): 1-12 (2013)The Mobile Media Based Emergency Management of Web Events Influence in Cyber-Physical Space., , , , , , and . Wirel. Pers. Commun., 95 (3): 1877-1890 (2017)Surface Coverage in Wireless Sensor Networks., , , , and . INFOCOM, page 109-117. IEEE, (2009)Location-aware ID Assignment in Wireless Sensor Networks., and . MASS, page 525-529. IEEE Computer Society, (2006)