Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semantic-Driven Cache Management Approach for Mobile Applications., , , and . International Conference on Computational Science (3), volume 3993 of Lecture Notes in Computer Science, page 184-191. Springer, (2006)An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping., , and . CSSE (3), page 116-120. IEEE Computer Society, (2008)978-0-7695-3336-0.Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1307-1319 (2021)Dynamic spectrum access for Internet-of-Things with joint GNN and DQN., , , , and . Ad Hoc Networks, (August 2024)Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications., , , and . Mob. Inf. Syst., (2016)Multi-Agent Deep Reinforcement Learning Based Downlink Beamforming in Heterogeneous Networks., , , , , and . IEEE Trans. Wirel. Commun., 22 (6): 4247-4263 (June 2023)Security Threats in the Data Plane of Software-Defined Networks., , , and . IEEE Netw., 32 (4): 108-113 (2018)CCA-secure ABE with outsourced decryption for fog computing., , , , and . Future Gener. Comput. Syst., (2018)Sub-Ontology Modularization for Large-Scale Web Ontologies., and . IRI, page 145-150. IEEE Systems, Man, and Cybernetics Society, (2009)Grid Service-Based Parallel Finite Element Analysis., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 123-130. Springer, (2003)