Author of the publication

CCOS: A Coded Computation Offloading Strategy for Satellite-Terrestrial Integrated Networks.

, , , , and . IWCMC, page 242-247. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apply Uniquely-Decodable Codes to Multiuser Physical-Layer Network Coding Based on Amplify-and-Forward Criterion., , , and . GLOBECOM, page 1-6. IEEE, (2015)Cardiac hypertrophy in vitamin D receptor knockout mice: role of the systemic and cardiac renin-angiotensin systems., , , , , , , , , and . American journal of physiology. Endocrinology and metabolism, (January 2005)Cooperative Jamming and Power Allocation in Two-Way Relaying System with Eavesdropper., , , , , and . VTC Fall, page 1-5. IEEE, (2013)Generalized Compute-and-Forward Schemes for Multi-Hop Two-Way Relay Channels., , and . VTC Fall, page 1-5. IEEE, (2013)An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding., , and . ICASSP, page 1282-1285. IEEE, (2010)Encoding Syntactic Dependency and Topical Information for Social Emotion Classification., , , and . SIGIR, page 881-884. ACM, (2019)An Improved Apriori Algorithm Based on Features., , , and . CIS, page 125-128. IEEE Computer Society, (2013)Repairable Fountain Codes with Unequal Locality for Heterogeneous D2D Data Storage Networks., , , , and . WISATS (1), volume 280 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 514-528. Springer, (2019)A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition., , , , and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 264-272. Springer, (2009)Self-adapting Cyclic Delay Diversity System., , , and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 547-554. Springer, (2009)