Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Performance Analysis and Comprehensive Evaluation Model of MES for Machining Workshop., , , and . DBTA, page 45-48. IEEE Computer Society, (2009)The Design of SMS Based Heterogeneous Mobile Botnet., , , , , and . JCP, 7 (1): 235-243 (2012)Measuring effective capacity of IEEE 802.15.4 beaconless mode., , , , and . WCNC, page 493-498. IEEE, (2006)Joint radio resource management based on the species competition model., , , , and . WCNC, page 52-57. IEEE, (2006)WebCall - A Rich Context Mobile Research Framework., , , , and . MobiCASE, volume 35 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-122. Springer, (2009)TCPW with bulk repeat in next generation wireless networks., , , and . ICC, page 674-678. IEEE, (2003)Similarity Mass and Approximate Reasoning., , , , and . ICFIE, volume 40 of Advances in Soft Computing, page 674-684. Springer, (2007)Multi-agent control algorithms for chemical cloud detection and mapping using unmanned air vehicles., , , and . IROS, page 2782-2788. IEEE, (2002)Analysis on Shanghai's logistics demand based on BP neural network., and . ICNSC, page 556-561. IEEE, (2013)Defense against low-rate TCP-targeted denial-of-service attacks., , and . ISCC, page 345-350. IEEE Computer Society, (2004)