Author of the publication

Joint optimization of throwbox deployment and storage allocation in Mobile Social Networks.

, , , , and . ICC, page 1213-1218. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual Cryptographic Scheme with High Image Quality., , and . CIS (1), page 366-370. IEEE Computer Society, (2008)Robust Audio Watermarking Scheme Based on Wavelet Transforming Stable Feature., , and . CIS (2), page 325-329. IEEE Computer Society, (2008)978-0-7695-3508-1.Virtual MAC concept and its protocol design in virtualised heterogeneous wireless network., , , and . IET Communications, 11 (1): 53-60 (2017)A Social-Aware Virtual MAC Protocol for Energy-Efficient D2D Communications Underlying Heterogeneous Cellular Networks., , , and . IEEE Trans. Vehicular Technology, 67 (9): 8372-8385 (2018)An on-site measurement coupled CFD based approach for wind resource assessment over complex terrains., , , , , , and . I2MTC, page 1-6. IEEE, (2018)DC pre-excitation starting control for induction motor base on flux identification and compensation., , , and . Automatisierungstechnik, 67 (7): 587-598 (2019)The impact of information technology capability, information sharing and government process redesign on the operational performance of emergency incident management systems.. Inf. Res., (2013)Efficient Classification of Distribution-Based Data for Internet of Things., , , , and . IEEE Access, (2018)Traffic-Aware Relay Vehicle Selection in Millimeter-Wave Vehicle-to-Vehicle Communication., , , , and . IEEE Wireless Commun. Letters, 8 (2): 400-403 (2019)Resource allocation in a generalized LTE air interface virtualization framework exploiting user behavior., , and . EURASIP J. Wireless Comm. and Networking, (2016)