Author of the publication

A Novel Base Station Analysis Scheme Based on Telecom Big Data.

, , , , , , and . HPCC/SmartCity/DSS, page 1076-1081. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rnnotator: an automated de novo transcriptome assembly pipeline from stranded RNA-Seq reads., , , , , , , , and . BMC Genomics, (2010)Probing dark exciton diffusion using photovoltage, , , and . Nature Communications, (January 2017)Dark Matter Results from First 98.7 Days of Data from the PandaX-II Experiment, , , , , , , , , and 44 other author(s). Phys. Rev. Lett., 117 (12): 121303 (September 2016)Evaluation of a Geospatial Annotation Tool for Unmanned Vehicle Specialist Interface., and . Int. J. Hum. Comput. Interaction, 28 (6): 361-372 (2012)A novel face recognition method based on IWLD and IWBC., , , , and . Multimedia Tools Appl., 75 (12): 6979-7002 (2016)Efficient convex optimization for real-time robust beamforming with microphone arrays., , , , , and . ICASSP, page 2656-2659. IEEE, (2011)Task Scheduling Prediction Algorithms for Dynamic Hardware/Software Partitioning., , and . PAAP, page 80-85. IEEE, (2012)Robust image dehazing using a duided filter., , , and . FSKD, page 1971-1975. IEEE, (2015)IP multimedia subsystems in 3GPP and 3GPP2: overview and scalability issues., , , and . IEEE Communications Magazine, 46 (1): 138-145 (2008)Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation., , , and . CoRR, (2019)