Author of the publication

Communication-efficient weighted ADMM for decentralized network optimization.

, , , and . ICASSP, page 4821-4825. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks., , , and . Ad Hoc & Sensor Wireless Networks, 17 (1-2): 87-102 (2012)Black hole search in computer networks: State-of-the-art, challenges and future directions., , , , and . J. Parallel Distrib. Comput., (2016)An Enhanced SYN Cookie Defence Method for TCP DDoS Attack., , and . JNW, 6 (8): 1206-1213 (2011)Sentiment analysis of Chinese microblogging based on sentiment ontology: a case study of '7.23 Wenzhou Train Collision'., , and . Connect. Sci., 25 (4): 161-178 (2013)Distributed jamming for secure communication in poisson fields of legitimate nodes and eavesdroppers., and . ACSCC, page 1881-1885. IEEE, (2012)Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints., and . Comput. J., 58 (7): 1628-1644 (2015)A regular scalable fault tolerant interconnection network for distributed processing., and . Parallel Computing, 27 (14): 1897-1919 (2001)Scenario-Based Validation: Beyond the User Requirements Notation., , and . Australian Software Engineering Conference, page 75-84. IEEE Computer Society, (2010)The temporal effect of speaking rate, focus and prosody in Chinese., , , and . ISCSLP, page 445-449. IEEE, (2012)Escaping from Blocking: A Dynamic Virtual Channel for Pipelined Routers., , , and . CISIS, page 795-800. (2008)