Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporate Spatial Information into pLSA for Scene Classification., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 170-177. Springer, (2012)Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 279-286. Springer, (2012)Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 156-162. Springer, (2012)Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices., , , and . IEEE Access, (2019)An optimized first path detector for UWB ranging using error characteristics., , , , and . WCNC, page 1230-1235. IEEE, (2014)QoS-Aware Scheduling in Emerging Novel Optical Wireless Integrated Networks., , , and . APNOMS, volume 5297 of Lecture Notes in Computer Science, page 445-448. Springer, (2008)Blockchain Storage Method Based on Erasure Code., , , , , and . DSC, page 98-105. IEEE, (2023)The Survey on the development of Secure Multi-Party Computing in the blockchain., , , , , and . DSC, page 1-7. IEEE, (2021)Short-delay clock recovery for CBR services in PTN., , and . IEEE Communications Letters, 13 (10): 791-793 (2009)Data integrity research of power metering automation system., , , , and . ISCIT, page 666-670. IEEE, (2016)