Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Verifying Strong Cache Consistency for Mobile Data Access ., , , , , and . ISSRE, page 103-111. IEEE Computer Society, (2001)Privacy-Preserving Query based on Virtual Organization in Grid Database., , and . ICYCS, page 276-281. IEEE Computer Society, (2008)An Adaptive Solution for Large-Scale, Cross-Video and Real-Time Visual Analytics., , , , , and . BigMM, page 212-215. IEEE Computer Society, (2015)Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks., , , , and . Ad Hoc Networks, (2017)An Elastic Data Persisting Solution with High Performance for Spark., , , and . SmartCity, page 656-661. IEEE Computer Society, (2015)Predicting temporal centrality in Opportunistic Mobile Social Networks based on social behavior of people., , , , and . Personal and Ubiquitous Computing, 20 (6): 885-897 (2016)Multi-criteria decision-making approaches based on distance measures for linguistic hesitant fuzzy sets., , and . JORS, 69 (5): 661-675 (2018)ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile Networks., , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 669-679 (2013)An Integrated Method of Supply Chains Vulnerability Assessment., , , and . Scientific Programming, (2016)Optimal Design of Noisy Transmultiplexer Systems., and . EURASIP J. Adv. Sig. Proc., (2006)