Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Beacon Collision Avoidance Mechanism Using Neighbor Tables at MAC Layer., , , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 396-405. Springer, (2016)An on-demand rate-aware joint power control and routing scheme., , and . WCNC, page 2126-2131. IEEE, (2014)Intrusion and anomaly detection model exchange for mobile ad-hoc networks., , , and . CCNC, page 635-639. IEEE, (2006)Complex Network Analysis Based on Politics of Northern Song Dynasty., , and . DSA, page 475-479. IEEE, (2019)Meta-modelling for fast analysis of CFD-simulated vapour cloud dispersion processes., , , , and . Comput. Chem. Eng., (2014)Laboratory Calibration of D-dot Sensor Based on System Identification Method., , , and . Sensors, 19 (15): 3255 (2019)The existence and global exponential stability of periodic solution for a neutral coupled system on networks with delays., , and . Appl. Math. Comput., (2015)Inconsistent fuzzy linear systems., and . Appl. Math. Comput., 181 (2): 973-981 (2006)Symmetric successive overrelaxation methods for fuzzy linear systems., and . Appl. Math. Comput., 175 (2): 891-901 (2006)Mining Multi-Dimensional Constrained Gradients in Data Cubes., , , , and . VLDB, page 321-330. Morgan Kaufmann, (2001)