Author of the publication

Computation Offloading and Resource Allocation For Cloud Assisted Mobile Edge Computing in Vehicular Networks.

, , , and . IEEE Trans. Vehicular Technology, 68 (8): 7944-7956 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modulation classification for asynchronous high-order QAM signals., , and . Wireless Communications and Mobile Computing, 11 (10): 1415-1422 (2011)Joint optimization of power allocation and relay location for regenerative relaying with multi-antenna reception at destination., and . Wireless Communications and Mobile Computing, 12 (16): 1405-1413 (2012)Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information., , , and . IEEE Wireless Commun. Letters, 3 (4): 357-360 (2014)Cognitive Beamforming for Throughput Maximization With Statistical Cross Channel State Information., and . IEEE Communications Letters, 18 (11): 2031-2034 (2014)High-rate Complex Orthogonal Space-time Block Codes for 5 and 6 Transmit Antennas., , and . Wireless Personal Communications, 49 (2): 263-274 (2009)Study of Optimal Operation for Huai'an Parallel Pumping Stations with Adjustable-Blade Units Based on Two Stages Decomposition-Dynamic Programming Aggregation Method., , , and . CCTA (3), volume 346 of IFIP Advances in Information and Communication Technology, page 554-562. Springer, (2010)Achieving secrecy capacity of MISO fading wiretap channels with artificial noise., , and . WCNC, page 2452-2456. IEEE, (2013)Exploiting Pure Superword Level Parallelism for Array Indirections., , , , and . PAAP, page 13-19. IEEE Computer Society, (2015)Cooperative signal classification using spectral correlation function in cognitive radio networks., , and . ICC, page 1-6. IEEE, (2016)Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme., , , , and . IEEE Trans. Information Forensics and Security, 11 (5): 1017-1026 (2016)