Author of the publication

A near-optimal cloud offloading under multi-user multi-radio environments.

, , , , , and . Peer-to-Peer Networking and Applications, 12 (5): 1454-1465 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization., , , , , and . J. Comput. Sci. Technol., 23 (2): 222-230 (2008)Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network., , , and . IMSCCS, page 352-359. IEEE Computer Society, (2007)A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks., , , and . JCM, 9 (1): 30-38 (2014)End-to-end performance of network with coding-aware., , , and . CHINACOM, page 831-835. IEEE Computer Society, (2011)Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China., , , , , , and . Remote Sensing, 9 (10): 1004 (2017)Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks., , , , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 149-161. Springer, (2016)A Useful System Prototype for Intrusion Detection - Architecture and Experiments., , and . Discovery Science, volume 3245 of Lecture Notes in Computer Science, page 388-395. Springer, (2004)A search and summary application for traffic events detection based on Twitter data., , , , and . SIGSPATIAL/GIS, page 549-552. ACM, (2014)Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks., , , , , and . MASS, page 475-480. IEEE Computer Society, (2018)An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks., , , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 16-22. Springer, (2015)