Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zhou, Huan
add a person with the name Zhou, Huan
 

Other publications of authors with the same name

Privacy-Preserving Query based on Virtual Organization in Grid Database., , and . ICYCS, page 276-281. IEEE Computer Society, (2008)Modeling and Verifying Strong Cache Consistency for Mobile Data Access ., , , , , and . ISSRE, page 103-111. IEEE Computer Society, (2001)An Adaptive Solution for Large-Scale, Cross-Video and Real-Time Visual Analytics., , , , , and . BigMM, page 212-215. IEEE Computer Society, (2015)An Elastic Data Persisting Solution with High Performance for Spark., , , and . SmartCity, page 656-661. IEEE Computer Society, (2015)Predicting temporal centrality in Opportunistic Mobile Social Networks based on social behavior of people., , , , and . Personal and Ubiquitous Computing 20 (6): 885-897 (2016)Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks., , , , and . Ad Hoc Networks (2017)Multi-criteria decision-making approaches based on distance measures for linguistic hesitant fuzzy sets., , and . JORS 69 (5): 661-675 (2018)ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile Networks., , , , and . IEEE Journal on Selected Areas in Communications 31 (9-Supplement): 669-679 (2013)An Integrated Method of Supply Chains Vulnerability Assessment., , , and . Scientific Programming (2016)Optimal Design of Noisy Transmultiplexer Systems., and . EURASIP J. Adv. Sig. Proc. (2006)