Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlating the Ambient Conditions and Performance Indicators of the LoRaWAN via Surrogate Gaussian Process-Based Bidirectional LSTM Stacked Autoencoder., , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3413-3427 (September 2023)A Lock-Controlled Session Table Partitioning Scheme with Dynamic Resource Balancing for Multi-Core Architecture., , and . ICC, page 1-5. IEEE, (2011)A pattern matching coprocessor for deep and large signature set in network security system., , , and . GLOBECOM, page 5. IEEE, (2005)A Time- and Memory- Efficient String Matching Algorithm for Intrusion Detection Systems., , and . GLOBECOM, IEEE, (2006)Reservation scheme for CRMA high-speed networks., and . Comput. Commun., 17 (6): 396-406 (1994)A Long Distance Low Bandwidth Firmware Update process for LPWAN - Taking LoRaP2P+ as example., , , and . ICOIN, page 646-651. IEEE, (2023)Quality of Service Provision in Cloud-Based Storage System for Multimedia Delivery., , and . IEEE Syst. J., 8 (1): 292-303 (2014)Knowledge Map Automatic Update System Using Graph Convolutional Network., , , , , and . BigComp, page 332-333. IEEE, (2023)A fast pattern matching algorithm for network processor-based intrusion detection system., , , and . IPCCC, page 271-275. IEEE, (2004)A Slot Interleaved Multiple Access Scheme for DQDB Metropolitan Area Networks., and . INFOCOM, page 1075-1082. IEEE Computer Society, (1993)