Author of the publication

Genius: Peer-to-Peer Location-Aware Gossip Using Network Coordinates.

, , , , , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 163-170. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ning, Ning
add a person with the name Ning, Ning
 

Other publications of authors with the same name

Vehicles Meet Infrastructure: Toward Capacity-Cost Tradeoffs for Vehicular Access Networks., , , , , and . IEEE Trans. Intelligent Transportation Systems, 14 (3): 1266-1277 (2013)NSDNA: a manually curated database of experimentally supported ncRNAs associated with nervous system diseases., , , , , , , , , and 4 other author(s). Nucleic Acids Research, 45 (Database-Issue): D902-D907 (2017)Layered Structure and Management in Internet of Things., , , , and . FGCN (2), page 386-389. IEEE Computer Society, (2007)A load-balancing and coding-aware multicast protocol for mobile ad hoc networks., , and . Int. J. Communication Systems, 29 (17): 2457-2470 (2016)Wi-Fi Hotspot at Signalized Intersection: Cost-Effectiveness for Vehicular Internet Access., , , , , and . IEEE Trans. Vehicular Technology, 65 (5): 3506-3518 (2016)A Simplified Traffic Generating Method for Network Reliability Based on Self-Similar Model., , , and . JCM, 8 (10): 629-636 (2013)A framework for simulating axon guidance., , and . Neurocomputing, (2005)Force Point Transfer Method to Solve the Structure of Soft Exoskeleton Robot Deformation due to the Driving Force., , , , , , and . RCAR, page 236-241. IEEE, (2018)Bio-inspired wearable soft upper-limb exoskeleton robot for stroke survivors., , , , , , and . ROBIO, page 2693-2698. IEEE, (2017)Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design., , and . IEEE Trans. Information Forensics and Security, 9 (2): 272-284 (2014)