Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network., , , , and . ICC, page 5833-5837. IEEE, (2008)Depth-layer-based multiview image synthesis and coding for interactive z- and x-dimension view switching., , and . Visual Information Processing and Communication, volume 8666 of SPIE Proceedings, page 86660C. SPIE, (2013)Tabu-Search-Based Metaheuristic Resource-Allocation Algorithm for SVC Multicast Over Wireless Relay Networks., , and . IEEE Trans. Vehicular Technology, 64 (1): 236-247 (2015)SDN-based Handover Scheme in Cellular/IEEE 802.11p Hybrid Vehicular Networks., , , , and . Sensors, 20 (4): 1082 (2020)Highly available network design and resource management of SINET4., , , , , , , and . Telecommun. Syst., 56 (1): 33-47 (2014)Resource Awareness in Unmanned Aerial Vehicle-Assisted Mobile-Edge Computing Systems., , , , , and . CoRR, (2019)EmoSense: Computational Intelligence Driven Emotion Sensing via Wireless Channel Data., , , , , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (3): 216-226 (2020)Sleepy: Wireless Channel Data Driven Sleep Monitoring via Commodity WiFi Devices., , , , , and . IEEE Trans. Big Data, 6 (2): 258-268 (2020)On Constructing z-Dimensional DIBR-Synthesized Images., , and . IEEE Trans. Multim., 18 (8): 1453-1468 (2016)Intelligent Post-Disaster Networking by Exploiting Crowd Big Data., , , , , , and . IEEE Netw., 34 (4): 49-55 (2020)