Author of the publication

Multi-Armed Bandit Channel Access Scheme With Cognitive Radio Technology in Wireless Sensor Networks for the Internet of Things.

, , , and . IEEE Access, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vector-valued variational principle in fuzzy metric space and its applications., , and . Fuzzy Sets and Systems, 119 (2): 343-354 (2001)An optimal weather condition dependent approach for emission planning in urban areas., , , and . Environmental Modelling and Software, 22 (4): 548-557 (2007)A review of Nyström methods for large-scale machine learning., , and . Information Fusion, (2015)A Blind Adaptive Technique for Cancelling ICI in OFDM-WPAN Systems., and . IJWIN, 12 (2): 109-121 (2005)Parametric calibration of speed-density relationships in mesoscopic traffic simulator with data mining., and . Inf. Sci., 179 (12): 2002-2013 (2009)POD reduced-order unstructured mesh modeling applied to 2D and 3D fluid flow., , , , , and . Computers & Mathematics with Applications, 65 (3): 362-379 (2013)Multi-task Sparse Gaussian Processes with Improved Multi-task Sparsity Regularization., and . CCPR (1), volume 483 of Communications in Computer and Information Science, page 54-62. Springer, (2014)Convolutional Neural Networks for human activity recognition using mobile sensors., , , , , , and . MobiCASE, page 197-205. IEEE, (2014)Impact of Time-Based Visualization on Situation Awareness., , and . HICSS, IEEE Computer Society, (2004)Single-task and multitask sparse Gaussian processes., and . ICMLC, page 1033-1038. IEEE, (2013)