Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCPW with bulk repeat in next generation wireless networks., , , and . ICC, page 674-678. IEEE, (2003)WebCall - A Rich Context Mobile Research Framework., , , , and . MobiCASE, volume 35 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-122. Springer, (2009)Measuring effective capacity of IEEE 802.15.4 beaconless mode., , , , and . WCNC, page 493-498. IEEE, (2006)Joint radio resource management based on the species competition model., , , , and . WCNC, page 52-57. IEEE, (2006)Defense against low-rate TCP-targeted denial-of-service attacks., , and . ISCC, page 345-350. IEEE Computer Society, (2004)Multi-agent control algorithms for chemical cloud detection and mapping using unmanned air vehicles., , , and . IROS, page 2782-2788. IEEE, (2002)Analysis on Shanghai's logistics demand based on BP neural network., and . ICNSC, page 556-561. IEEE, (2013)Similarity Mass and Approximate Reasoning., , , , and . ICFIE, volume 40 of Advances in Soft Computing, page 674-684. Springer, (2007)Near-Field Passive RFID Communication: Channel Model and Code Design., , , and . IEEE Trans. Communications, 62 (5): 1716-1727 (2014)Parallel Objects in Distributed Ada95 Compiler and Running System - PDEFA., , and . TOOLS (31), page 320-325. IEEE Computer Society, (1999)