Author of the publication

Performance Characterization of Machine-to-Machine Networks With Energy Harvesting and Social-Aware Relays.

, , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.A study of process arrival patterns for MPI collective operations., , and . ICS, page 168-179. ACM, (2007)On the extended Bellman-Ford algorithm to solve two-constrained quality of service routing problems.. ICCCN, page 304-310. IEEE, (1999)Non-Gaussian Discriminative Factor Models via the Max-Margin Rank-Likelihood., , , , and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 1254-1263. JMLR.org, (2015)Microcalcification detection based on localized texture comparison., and . ICIP, page 2953-2956. IEEE, (2004)Convolutional factor analysis inspired compressive sensing., and . ICIP, page 550-554. IEEE, (2017)Cold-Start Representation Learning: A Recommendation Approach with Bert4Movie and Movie2Vec., , , and . ACM Multimedia, page 2612-2616. ACM, (2019)Solving linear inverse problems using generative models., and . ISIT, page 512-516. IEEE, (2019)Blocking performances for fixed/flexible-grid and sub-band conversion in optical networks., , and . ICCC, page 116-120. IEEE, (2014)Car Plate Localization Using Pulse Coupled Neural Network in Complicated Environment., , and . PRICAI, volume 4099 of Lecture Notes in Computer Science, page 1206-1210. Springer, (2006)