From post

A New Data Transmission Strategy in Mobile D2D Networks - Deterministic, Greedy, or Planned Opportunistic Routing?

, , , и . IEEE Trans. Vehicular Technology, 66 (1): 594-609 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Interoperability Points Based Interoperability Approach for SaaS Applications., , , и . IWEI, том 144 из Lecture Notes in Business Information Processing, стр. 22-35. Springer, (2013)VVCS: Verifiable Visual Cryptography Scheme., , , и . CIS, стр. 974-977. IEEE Computer Society, (2011)Delay-constrained single-copy multi-path data transmission in mobile opportunistic networks., , , и . SECON, стр. 37-45. IEEE, (2014)Stability and Hopf bifurcation in a model of gene expression with distributed time delays., , и . Appl. Math. Comput., (2014)Carrying Network Accessing Architecture and Strategy Based on Business Differentiation., , , , и . J. Networks, 8 (7): 1470-1475 (2013)An SDN-Based Wireless Authentication and Access Control Security Solution., , и . FCS, том 879 из Communications in Computer and Information Science, стр. 179-189. Springer, (2018)Research on Wireless Sensor Network and Carrying Network Integration Based on Gateway., , , и . iThings/CPSCom, стр. 748-751. IEEE Computer Society, (2011)The Study on Influences of Online Review Helpfulness., , и . PACIS, стр. 53. (2014)Minimum-Cost Crowdsourcing with Coverage Guarantee in Mobile Opportunistic D2D Networks., и . IEEE Trans. Mob. Comput., 16 (10): 2806-2818 (2017)A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine Transform., , , и . 3PGCIC, стр. 525-530. IEEE Computer Society, (2014)