Author of the publication

CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding.

, , , and . INFOCOM, page 100-108. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big Data Sensing and Service: A Tutorial., , and . BigDataService, page 79-88. IEEE Computer Society, (2015)A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking., , , and . IEEE Trans. Computers, 65 (5): 1418-1427 (2016)An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway., , , , , and . IEEE Trans. Vehicular Technology, 67 (12): 11332-11344 (2018)Sustainability Analysis for Fog Nodes With Renewable Energy Supplies., , , , , , and . IEEE Internet of Things Journal, 6 (4): 6725-6735 (2019)Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading., , , , , , and . IEEE Internet of Things Journal, 6 (3): 4176-4187 (2019)On the Stress Function-Based OWA Determination Method With Optimization Criteria., and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 42 (1): 246-257 (2012)A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks., , , , and . IEEE Trans. Comput. Social Systems, 5 (3): 773-784 (2018)A Resource-Search and Routing Algorithm within PCDN Autonomy Area., , , and . PDCAT, page 509-514. IEEE Computer Society, (2007)Fault-Tolerant Servers for Anycast Communication., , and . PDPTA, page 1244-1250. CSREA Press, (2003)Why it is Hard to Fight against Cyber Criminals?, , , and . ICDCS Workshops, page 537-541. IEEE Computer Society, (2012)