Author of the publication

Retransmission mechanism with probabilistic network coding in wireless networks.

, , , , , and . GLOBECOM, page 4502-4507. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Modeling of Virtual Machine Live Migration., and . IEEE CLOUD, page 492-499. IEEE, (2011)DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection., , , , , , and . SCIENCE CHINA Information Sciences, 62 (9): 199104:1-199104:3 (2019)Differentiable and Scalable Generative Adversarial Models for Data Imputation., , , , and . CoRR, (2022)Hopf Bifurcation of the Wireless Network Congestion Model with State-Dependent Round Trip Delay., and . I. J. Bifurcation and Chaos, 28 (9): 1850110 (2018)N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network., , , , , , and . CoRR, (2019)Knowledge Fusion: A New Method to Share and Integrate Distributed Knowledge Sources., , and . EC-TEL, volume 4227 of Lecture Notes in Computer Science, page 609-614. Springer, (2006)Efficient and Effective Data Imputation with Influence Functions., , , , , and . Proc. VLDB Endow., 15 (3): 624-632 (2021)A New Self-Adapting Knowledge Fusion System., , , and . FSKD (3), page 454-458. IEEE Computer Society, (2007)0-7695-2874-0.Retransmission mechanism with probabilistic network coding in wireless networks., , , , , and . GLOBECOM, page 4502-4507. IEEE, (2014)Mining Alarm Database of Telecommunication Network for Alarm Association Rules., , and . PRDC, page 281-286. IEEE Computer Society, (2005)