Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing and Optimizing Cellular Network Performance During Crowded Events., , , , , and . IEEE/ACM Trans. Netw., 24 (3): 1308-1321 (2016)Optimal channel choices and online refund policies in a low-carbon tourism supply chain considering carbon reduction level., , , and . INFOR Inf. Syst. Oper. Res., 61 (1): 34-66 (January 2023)Solving the reconstruction-generation trade-off: Generative model with implicit embedding learning., , , and . Neurocomputing, (September 2023)KNN-enhanced Deep Learning Against Noisy Labels., , , , and . CoRR, (2020)The impact of different strategy update mechanisms on information dissemination under hyper network vision., , , and . Commun. Nonlinear Sci. Numer. Simul., (2022)Small sum privacy and large sum utility in data publishing., , , , and . J. Biomed. Informatics, (2014)Compressing rectilinear pictures and minimizing access control lists., , , , , and . SODA, page 1066-1075. SIAM, (2007)Troubleshooting chronic conditions in large IP networks., , , , , , and . CoNEXT, page 2. ACM, (2008)Securely outsourcing power grid simulation on cloud., and . ACM Great Lakes Symposium on VLSI, page 225-226. ACM, (2014)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)