Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PNDOM: A domain function-based software component composition plan build approach., , , , and . SEDE, page 119-124. ISCA, (2007)An Illegal Indirect Access Prevention Method in Transparent Computing System., , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 264-275. Springer, (2015)Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment., , , , , and . FGCN (1), page 83-88. IEEE Computer Society, (2008)Towards Seamless Wireless Link Connection., , , , and . MobiSys, page 137-149. ACM, (2023)SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 56-67. Springer, (2016)Mobility-Aware Computation Offloading with Adaptive Load Balancing in Small-Cell MEC., , , , , , and . ICC, page 4330-4335. IEEE, (2022)Boosting Internet Card Cellular Business via User Portraits: A Case of Churn Prediction., , , , , , and . INFOCOM, page 640-649. IEEE, (2022)Network-Aware Data Transmission Scheduling for Saving Energy in Cellular Networks., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 514-521. IEEE, (2019)A novel component retrieval method based on weighted facet tree., , , , , and . J. Supercomput., 66 (3): 1167-1177 (2013)Provably secure three-party authenticated key agreement protocol using smart cards., , , , , and . Comput. Networks, (2014)