Author of the publication

Pseudo Target Dynamic Feasible Region Constraint Location Method Using Single Observer in NLOS Environment.

, , and . GLOBECOM, page 4820-4824. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal approximation using dynamic recurrent neural networks: discrete-time version., , and . ICNN, page 403-408. IEEE, (1995)Robust Artificial Noise Aided Transmit Method for Multicast MISO Wiretap Channels with Imperfect Covariance-Based CSI., , , , and . VTC Spring, page 1-5. IEEE, (2015)RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications., and . INFOCOM, IEEE, (2006)Weighted pseudo almost periodic functions and applications to evolution equations with delay., , and . Appl. Math. Comput., 219 (17): 8949-8958 (2013)trieFinder: an efficient program for annotating digital gene expression (DGE) tags., , , , and . BMC Bioinform., (2014)Multi-dimensional data visualisation method based on convex-corrected Radviz., , , , , and . Int. J. Comput. Appl. Technol., 63 (1/2): 114-124 (2020)Dsa-PAML: a parallel automated machine learning system via dual-stacked autoencoder., , , , , , and . Neural Comput. Appl., 34 (15): 12985-13006 (2022)Computation Offloading Outage Probability Analysis and Min-Max Fairness Optimization in RIS-Assisted MEC System., , , , , , and . IEEE Trans. Veh. Technol., 72 (4): 4615-4627 (April 2023)Understanding overlay characteristics of a large-scale peer-to-peer IPTV system., , , and . ACM Trans. Multim. Comput. Commun. Appl., 6 (4): 31:1-31:24 (2010)Secret key generation based on private pilot under man-in-the-middle attack., , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)