Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads., , , , , , , , , and 3 other author(s). BMC Bioinformatics, (2015)Long-Term Traffic Scheduling Based on Stacked Bidirectional Recurrent Neural Networks in Inter-Datacenter Optical Networks., , , , , , , , , and . IEEE Access, (2019)A Multi-ring BPSK Mapping in Quantum Noise Stream Cipher., , , , , and . OECC/PSC, page 1-3. IEEE, (2019)Actor-Critic-Based Resource Allocation for Multi-Modal Optical Networks., , , , , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Communicating Crisis with Persuasion: Examining Official Twitter Messages on Heat Hazards., , and . ISCRAM, ISCRAM Association, (2018)Edge Computing and Networking: A Survey on Infrastructures and Applications., , , , , and . IEEE Access, (2019)Demonstration of multi-domain spectrum defragmentation with minimum controller-participation degree in elastic optical networks., , , , , , and . ICNC, page 1-5. IEEE Computer Society, (2016)Accurate Fault Location Using Deep Belief Network for Optical Fronthaul Networks in 5G and Beyond., , , , , , , and . IEEE Access, (2019)Master Controller Election Mechanism Based on Controller Cluster in Software Defined Optical Networks., , , , , , and . ChinaCom (1), volume 209 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 148-155. Springer, (2016)DDoS Attack Mitigation Based on Traffic Scheduling in Edge Computing- Enabled TWDM-PON., , , , , and . IEEE Access, (2021)