Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model., , , , , , and . MASS, page 353-362. IEEE Computer Society, (2009)CCD: Locating Event in Wireless Sensor Network without Locations., , and . MASS, page 672-677. IEEE Computer Society, (2011)Broadcast capacity for wireless ad hoc networks., , , , , and . MASS, page 114-123. IEEE Computer Society, (2008)Secure Multimedia Streaming with Trusted Digital Rights Management., , and . LCN, page 817-821. IEEE Computer Society, (2005)Twins: Device-free object tracking using passive tags., , , , , , , and . INFOCOM, page 469-476. IEEE, (2014)Nowhere to hide: An empirical study on hidden UHF RFID tags., , , , , , and . ICPADS, page 608-615. IEEE Computer Society, (2014)Smart retransmission for CSI recovery in uplink multi-user MIMO networks., , , , and . INFOCOM Workshops, page 1061-1062. IEEE, (2016)Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs., , , , , , , , , and . Frontiers of Computer Science in China, 4 (3): 334-338 (2010)Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management., , , , , and . IJDSN, (2013)Near-Optimal Diagnosis System Deployment in Wireless Sensor Networks., , and . IJDSN, (2013)