Author of the publication

Delay-reliability tradeoff for wireless-connected indoor robot surveillance based on radio environment map.

, , , , , and . PIMRC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A General Metric of Load Balancing in delta-Range., , , and . APPT, volume 2834 of Lecture Notes in Computer Science, page 311-321. Springer, (2003)Networked Robotic System Simulation Platform: Hardware-in-the-Loop Architecture, Enabling Technologies and Implementations., , , , , , , , , and . WCSP, page 1194-1199. IEEE, (2020)A Message Logging Protocol Based on User Level Failure Mitigation., , , , and . ICA3PP (1), volume 8285 of Lecture Notes in Computer Science, page 312-323. Springer, (2013)Model Compression for a Plasticity Neural Network in a Maze Exploration Scenario., , , and . ICONIP (5), volume 1516 of Communications in Computer and Information Science, page 488-497. Springer, (2021)Multi-UAV Adaptive Path Planning in Complex Environment Based on Behavior Tree., , , , and . CollaborateCom (2), volume 350 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 494-505. Springer, (2020)Optimizing Stencil Application on Multi-thread GPU Architecture Using Stream Programming Model., , , , and . ARCS, volume 5974 of Lecture Notes in Computer Science, page 234-245. Springer, (2010)Parallization of Adaboost Algorithm through Hybrid MPI/OpenMP and Transactional Memory., , and . PDP, page 94-100. IEEE Computer Society, (2011)Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery., , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 169-178. Springer, (2009)Data privacy and integrity appropriate for disk protection., , , and . CIT, page 414-419. IEEE Computer Society, (2008)Model-guided strip size selection for minimal execution time on imagine stream processor., , , , and . CIT, page 267-272. IEEE Computer Society, (2008)