Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of Safety Management Approaches to Unmanned Aerial Vehicles and Enabling Technologies., , , , and . J. Comm. Inform. Networks, 3 (4): 1-14 (2018)Internet congestion control under node and link constraints.. IECON, page 5837-5842. IEEE, (2017)Analysis of telephone network traffic based on a complex user network, , , , and . Physica A: Statistical Mechanics and its Applications, 368 (2): 583--594 (Aug 15, 2006)Prior Knowledge-Based Event Network for Chinese Text., , , and . Int. J. Digit. Multim. Broadcast., (2017)Attack Vulnerability of Complex Communication Networks., and . IEEE Trans. Circuits Syst. II Express Briefs, 55-II (1): 65-69 (2008)A Scale-Free Topology Construction Model for Wireless Sensor Networks., , , , , and . Int. J. Distributed Sens. Networks, (2014)Optimal resource allocation under TCP Reno and Vegas in complex communication networks., and . ISCAS, page 2676-2679. IEEE, (2015)Traffic congestion in interconnected complex networks., , , and . CoRR, (2014)Fast Responsive Framework for Optimal Power Flow Analysis in Power System., , , , and . APCCAS, page 419-423. IEEE, (2022)Performance of differential chaos-shift-keying digital communication systems over a multipath fading channel with delay spread., , and . IEEE Trans. Circuits Syst. II Express Briefs, 51-II (12): 680-684 (2004)