Author of the publication

Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks.

, , , and . ComComAP, page 121-126. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Niu, Jianwei
add a person with the name Niu, Jianwei
 

Other publications of authors with the same name

A venues-aware message routing scheme for delay-tolerant networks., , , , and . Wireless Communications and Mobile Computing, 15 (13): 1695-1710 (2015)Message Dissemination in Delay-Tolerant Networks with Probabilistic Encounters., , and . WETICE, page 330-335. IEEE Computer Society, (2012)A Novel Cloud-Based Trust Model for Pervasive Computing., , , and . CIT, page 693-700. IEEE Computer Society, (2004)A Novel Approach to Evaluate Trustworthiness and Uncertainty of Trust Relationships in Peer-to-Peer Computing., , and . CIT, page 382-388. IEEE Computer Society, (2005)Quantifying individual communication capability in opportunistic mobile social networks., , , and . ComComAP, page 1-6. IEEE, (2014)A secure remote user mutual authentication scheme using smart cards., , , , and . ComComAP, page 89-92. IEEE, (2014)Apply Model Checking to Security Analysis in Trust Management., , and . ICDE Workshops, page 734-743. IEEE Computer Society, (2007)JLMC: A clustering method based on Jordan-Form of Laplacian-Matrix., , and . IPCCC, page 1-8. IEEE Computer Society, (2014)FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems., , , and . J. Network and Computer Applications, (2016)Robust three-factor remote user authentication scheme with key agreement for multimedia systems., , , , and . Security and Communication Networks, 9 (13): 1916-1927 (2016)