Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the optimal design of secure network coding against wiretapping attack., , , , and . Computer Networks, (2016)Improving the Uplink Performance of Drive-Thru Internet via Platoon-Based Cooperative Retransmission., , , , , and . IEEE Trans. Vehicular Technology, 63 (9): 4536-4545 (2014)Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks., , , , , , , and . IEEE Trans. Parallel Distrib. Syst., 21 (12): 1851-1866 (2010)Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks., , , , and . IEEE/ACM Trans. Netw., 20 (2): 450-462 (2012)A Machine Learning Accelerator In-Memory for Energy Harvesting., , , , , , , and . CoRR, (2019)A correlation-based coverage-aware and energy-balanced probabilistic flooding algorithm., , , and . IJSNet, 25 (4): 207-217 (2017)QoS Model of WSNs Communication in Smart Distribution Grid., , , and . IJDSN, 12 (1): 6926793:1-6926793:23 (2016)A Clustering Algorithm of Underwater Acoustic Sensor Networks based on Hierarchical 3D Mesh., , , , and . J. Inf. Sci. Eng., 35 (5): 1011-1027 (2019)MmWave and VLC-Based Indoor Channel Models in 5G Wireless Networks., , , and . IEEE Wireless Commun., 25 (5): 70-77 (2018)A Survey on Platoon-Based Vehicular Cyber-Physical Systems., , , , and . IEEE Communications Surveys and Tutorials, 18 (1): 263-284 (2016)