Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retransmission in the network-coding-based packet network., , , and . Journal of Zhejiang University - Science C, 11 (7): 544-554 (2010)On the Complexity of Quality of Service Routing.. Inf. Process. Lett., 69 (3): 111-114 (1999)Study and Design an Anycast Routing Protocol for Wireless Sensor Networks., , , and . JNW, 6 (12): 1726-1733 (2011)An improved attack on clock-controlled shift registers based on hardware implementation., , , and . SCIENCE CHINA Information Sciences, 56 (11): 1-10 (2013)Decentralized Robust Control Design for a Class of Similar Composite Systems with Uncertainties., , , and . Cybernetics and Systems, 31 (2): 193-202 (2000)Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries.. TIIS, 6 (10): 2750-2763 (2012)Exploration of TCM Masters Knowledge Mining., , and . J. Systems Science & Complexity, 21 (1): 34-45 (2008)Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formulæ., , and . J. Mathematical Cryptology, 2 (3): 227-255 (2008)Verification and validation in railway signalling engineering - an application of enterprise systems techniques., , , and . Enterprise IS, 8 (4): 490-511 (2014)M-TORA: a TORA-Based Multi-Path Routing Algorithm for Mobile Ad Hoc Networks., , , , and . GLOBECOM, IEEE, (2006)