Author of the publication

A Sampling-Based Algorithm for Approximating Maximum Average Value Region in Wireless Sensor Network.

, , , and . ICPP Workshops, page 17-23. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Simulation of Temperature Field in Selective Laser Sintering., , , and . CCTA (4), volume 347 of IFIP Advances in Information and Communication Technology, page 474-479. Springer, (2010)Fair Multi-influence Maximization in Competitive Social Networks., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 253-265. Springer, (2017)Algorithms for the m-Coverage Problem and k-Connected m-Coverage Problem in Wireless Sensor Networks., , , , and . NPC, volume 4672 of Lecture Notes in Computer Science, page 250-259. Springer, (2007)Multiple heterogeneous data ferry trajectory planning in wireless sensor networks., , , , , and . INFOCOM, page 2274-2282. IEEE, (2014)Cross-Layer Sleep Scheduling Design in Service-Oriented Wireless Sensor Networks., , , and . IEEE Trans. Mob. Comput., 9 (11): 1622-1633 (2010)On Optimal Replication of Data Object at Hierarchical and Transparent Web Proxies., , , and . IEEE Trans. Parallel Distributed Syst., 16 (8): 673-685 (2005)Accurate and Efficient Indoor Location by Dynamic Warping in Sequence-Type Radio-map., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (1): 50:1-50:22 (2018)A Double-Auction-Based Mechanism to Stimulate Secondary Users for Cooperative Sensing in Cognitive Radio Networks., , , and . IEEE Trans. Veh. Technol., 64 (8): 3770-3782 (2015)A fault diagnosis method to defend scapegoating attack in network tomography., , , and . Theor. Comput. Sci., (2023)Target users' activation probability maximization with different seed set constraints in social networks., , , , , , and . Theor. Comput. Sci., (2020)