Author of the publication

CodeRepair: PHY-layer partial packet recovery without the pain.

, , , and . INFOCOM, page 1463-1471. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel rating prediction method based on user relationship and natural noise., , , and . Multimedia Tools Appl., 77 (4): 4171-4186 (2018)LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation., , , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-62. Springer, (2017)K-hop centrality metric for identifying influential spreaders in dynamic large-scale social networks., , , and . GLOBECOM, page 2954-2959. IEEE, (2014)A venues-aware message routing scheme for delay-tolerant networks., , , , and . Wirel. Commun. Mob. Comput., 15 (13): 1695-1710 (2015)A Patience-Aware Recommendation Scheme for Shared Accounts on Mobile Devices., , , , , and . IEEE Trans. Knowl. Data Eng., 34 (12): 5571-5585 (2022)Real-time generation of personalized home video summaries on mobile devices., , , and . Neurocomputing, (2013)Affivir: An affect-based Internet video recommendation system., , , and . Neurocomputing, (2013)Unpaired Photo-to-manga Translation Based on The Methodology of Manga Drawing., , , , , and . CoRR, (2020)Robust three-factor remote user authentication scheme with key agreement for multimedia systems., , , , and . Secur. Commun. Networks, 9 (13): 1916-1927 (2016)Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications., , , , and . J. Medical Syst., 40 (12): 268:1-268:12 (2016)