Author of the publication

Modeling Key Infection in Large-Scale Sensor Networks.

, , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 265-275. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure collaboration in global design and supply chain environment: Problem analysis and literature review., , , , and . Computers in Industry, 63 (6): 545-556 (2012)Classification of Product Requirements Based on Product Environment., and . Concurrent Engineering: R&A, 14 (3): 219-230 (2006)New delay-dependent stability criteria for neutral-type neural networks with mixed random time-varying delays., , , , and . Neurocomputing, (2015)A distance-based parameter free algorithm for curve reconstruction., , , and . Computer-Aided Design, 40 (2): 210-222 (2008)Performance Analysis of Finite-Length Spatial-Temporal Network Coding., , and . IEEE Communications Letters, 18 (7): 1163-1166 (2014)Degrees of Freedom of the Three-User Rank-Deficient MIMO Interference Channel., , , , and . IEEE Trans. Wireless Communications, 13 (8): 4179-4192 (2014)Novel delay-dependent master-slave synchronization criteria of chaotic Lur'e systems with time-varying-delay feedback control., , , , , and . Applied Mathematics and Computation, (2016)SAM: A Sorting Approach for Optimizing Multijoin Queries., , , , and . DEXA (1), volume 9261 of Lecture Notes in Computer Science, page 367-383. Springer, (2015)Analysis of the Impact of eMTC on Legacy LTE., , , and . IWCMC, page 1133-1138. IEEE, (2019)Throughput Maximization for UAV-Enabled Mobile Relaying Systems., , and . IEEE Trans. Communications, 64 (12): 4983-4996 (2016)