Author of the publication
Please choose a person to relate this publication to
To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.
Other publications of authors with the same name
An Adaptive Solution for Large-Scale, Cross-Video and Real-Time Visual Analytics.BigMM, page 212-215. IEEE Computer Society, (2015)An Elastic Data Persisting Solution with High Performance for Spark.SmartCity, page 656-661. IEEE Computer Society, (2015)Predicting temporal centrality in Opportunistic Mobile Social Networks based on social behavior of people.Personal and Ubiquitous Computing, 20 (6):
885-897 (2016)Privacy-Preserving Query based on Virtual Organization in Grid Database.ICYCS, page 276-281. IEEE Computer Society, (2008)Modeling and Verifying Strong Cache Consistency for Mobile Data Access .ISSRE, page 103-111. IEEE Computer Society, (2001)An Integrated Method of Supply Chains Vulnerability Assessment.Scientific Programming, (2016)Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks.Ad Hoc Networks, (2017)ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile Networks.IEEE Journal on Selected Areas in Communications, 31 (9-Supplement):
669-679 (2013)Optimal Design of Noisy Transmultiplexer Systems.EURASIP J. Adv. Sig. Proc., (2006)Multi-criteria decision-making approaches based on distance measures for linguistic hesitant fuzzy sets.JORS, 69 (5):