Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CBSNTS: A Chaotic Based Security Network Transmission System., , , and . JNW, 9 (8): 1985-1992 (2014)An Interpretation of Erlang into Value-passing Calculus., and . JNW, 8 (7): 1504-1513 (2013)A Low-Complexity Digital Predistortion Algorithm for Power Amplifier Linearization., , , and . TBC, 60 (4): 670-678 (2014)Large matchings in uniform hypergraphs and the conjectures of Erdős and Samuels., , , , , and . J. Comb. Theory, Ser. A, 119 (6): 1200-1215 (2012)Bandwidth theorem for random graphs., , and . J. Comb. Theory, Ser. B, 102 (1): 14-37 (2012)Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems., , and . Appl. Soft Comput., (2014)Developing Slow Start over Wireless Networks., , , and . IMSCCS, page 106-109. IEEE Computer Society, (2008)Lattice Based Discriminative Model Combination Using Automatically Induced Phonetic Contexts., and . INTERSPEECH, page 1941-1944. ISCA, (2011)Partition based optimization for updating sample allocation strategy using lookahead., , and . Winter Simulation Conference, page 3577-3588. IEEE/ACM, (2015)BUPT_WILDCAT at TREC 2011 Session Track., , , , and . TREC, Special Publication 500-296, National Institute of Standards and Technology (NIST), (2011)