Author of the publication

An asymptotic analysis of some expert fusion methods.

, and . Pattern Recognition Letters, 22 (8): 901-904 (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog Computing Based Ultraviolet Radiation Measurement via Smartphones., , and . HotWeb, page 79-84. IEEE Computer Society, (2015)Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks., , , , and . IEEE Trans. Mob. Comput., 7 (3): 322-331 (2008)Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics., , , , and . IEEE Trans. Mob. Comput., 2 (3): 248-256 (2003)Timer-Based CDS Construction in Wireless Ad Hoc Networks., , , , and . IEEE Trans. Mob. Comput., 10 (10): 1388-1402 (2011)Improving Macrocell Downlink Throughput in Rayleigh Fading Channel Environment Through Femtocell User Cooperation., , , , and . IEEE Trans. Wireless Communications, 12 (12): 6488-6499 (2013)Virtual track: applications and challenges of the RFID system on roads., , and . IEEE Network, 28 (1): 42-47 (2014)SINR based shortest link scheduling with oblivious power control in wireless networks., , , , and . J. Network and Computer Applications, (2017)An asymptotic analysis of some expert fusion methods., and . Pattern Recognition Letters, 22 (8): 901-904 (2001)I Can See Your Brain: Investigating Home-Use Electroencephalography System Security., , , , , and . IEEE Internet of Things Journal, 6 (4): 6681-6691 (2019)Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks., , , , , and . Computer Communications, 33 (12): 1369 (2010)