Author of the publication

Optimal Placement in RFID-Integrated VANETs for Intelligent Transportation System.

, , , , , and . RFID-TA, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulating the Wenchuan earthquake with accurate surface topography on Sunway TaihuLight., , , , , , , , , and 3 other author(s). SC, page 40:1-40:12. IEEE / ACM, (2018)Quantum teleportation with independent sources and prior entanglement distribution over a network, , , , , , , , , and 8 other author(s). Nature Photonics, 10 (10): 671-675 (Oct 1, 2016)Computational Approaches for Traditional Chinese Painting: From the "Six Principles of Painting" Perspective., , , , , , and . J. Comput. Sci. Technol., 39 (2): 269-285 (March 2024)Computational Approaches for Traditional Chinese Painting: From the "Six Principles of Painting" Perspective., , , , , , and . CoRR, (2023)ScrollTimes: Tracing the Provenance of Paintings as a Window into History., , , , , , , and . CoRR, (2023)Decision making with a sequential modeling of pairwise comparison process., , , and . Knowl. Based Syst., (2020)Analysis of the two-particle controlled interacting quantum walks., , , , and . Quantum Inf. Process., 12 (6): 2167-2176 (2013)The general theory of three-party quantum secret sharing protocols over phase-damping channels., , , , and . Quantum Inf. Process., 12 (10): 3291-3304 (2013)Is quantum key distribution suitable for steganography?, , , , and . Quantum Inf. Process., 12 (1): 625-630 (2013)A quantum protocol for millionaire problem with Bell states., , , and . Quantum Inf. Process., 12 (6): 2241-2249 (2013)