Author of the publication

End-to-end performance of network with coding-aware.

, , , and . CHINACOM, page 831-835. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DCAR: DTN Congestion Avoidance Routing Algorithm Based on Tokens in an Urban Environment., , , and . J. Sensors, (2017)Joint Uplink and Downlink Optimization for Resource Allocation Under D2D Communication Networks., , , , , and . CWSN, volume 1101 of Communications in Computer and Information Science, page 35-47. Springer, (2019)PUEGM: A Method of User Revenue Selection Based on a Publisher-User Evolutionary Game Model for Mobile Crowdsensing., , and . Sensors, 19 (13): 2927 (2019)A joint optimization scheme of task caching and offloading for smart factories., and . J. Supercomput., 79 (13): 15185-15211 (September 2023)A joint strategy for service deployment and task offloading in satellite-terrestrial IoT., , , , , and . Comput. Networks, (April 2023)Random network coding-based optimal scheme for perfect wireless packet retransmission problems., , , , , , , and . Wirel. Commun. Mob. Comput., 13 (6): 577-592 (2013)A DL-Based High-Precision Positioning Method in Challenging Urban Scenarios for B5G CCUAVs., , , and . IEEE J. Sel. Areas Commun., 41 (6): 1670-1687 (June 2023)Random Network Coding Based Schemes for Perfect Wireless Packet Retransmission Problems in Multiple Channel Networks., , , , and . Wirel. Pers. Commun., 69 (4): 1517-1534 (2013)An attention-based automatic vulnerability detection approach with GGNN., , , , , , , , and . Int. J. Mach. Learn. Cybern., 14 (9): 3113-3127 (September 2023)A Novel Situation Awareness Model for Network Systems' Security., , , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 1077-1084. Springer, (2007)