Author of the publication

A Novel Method of Network Burst Traffic Real-Time Prediction Based on Decomposition.

, , , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 784-793. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using social network theory for modeling human mobility., , , and . IEEE Network, 24 (5): 6-13 (2010)BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks., , , , and . INFOCOM, page 2701-2705. IEEE, (2012)Efficiency-Aware: Maximizing Energy Utilization for Sensor Nodes Using Photovoltaic-Supercapacitor Energy Systems., , , and . IJDSN, (2013)An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs., , , and . WCNIS, page 483-487. IEEE, (2010)On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems., , , and . IEEE Trans. Parallel Distrib. Syst., 27 (10): 2967-2983 (2016)On Privacy Protection of Latent Dirichlet Allocation Model Training., , , and . IJCAI, page 4860-4866. ijcai.org, (2019)A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks., , , , and . IEEE Trans. Vehicular Technology, 60 (3): 1045-1058 (2011)Network coding versus traditional routing in adversarial wireless networks., , , and . Ad Hoc Networks, (2014)SPAIS: A novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks., , and . Computer Networks, (2015)HLLS: A History information based Light Location Service for MANETs., , , , and . Computer Networks, 56 (2): 731-744 (2012)