Author of the publication

Personalized and efficient social image transmission scheme in mobile wireless network.

, , , , and . Multim. Tools Appl., 75 (6): 2931-2968 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alert-Driven Process Integration in a Web Services Environment., , and . ICWS, page 145-151. CSREA Press, (2003)Efficient Personalized Probabilistic Retrieval of Chinese Calligraphic Manuscript Images in Mobile Cloud Environment., , , , and . ACM Trans. Asian Lang. Inf. Process., 13 (4): 18:1-18:38 (2014)User perceptions, academic library usage and social capital: a correlation analysis under COVID-19 after library renovation., , , and . Libr. Hi Tech, 40 (2): 304-322 (2022)A worldwide quantitative review of the iSchools' archival education., and . Libr. Hi Tech, 40 (5): 1497-1518 (2022)Editorial: 40th anniversary: contemporary library research., and . Libr. Hi Tech, 40 (6): 1525-1531 (2022)The Use of Digital Watermarking for Intelligence Multimedia Document Distribution., , and . J. Theor. Appl. Electron. Commer. Res., 3 (3): 103-118 (2008)Bridging K-12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context., , , and . IT Prof., 25 (2): 64-70 (March 2023)A Three-Layer Model for Workflow Semantic Recovery in an Object-Oriented Environment.. ER, volume 2224 of Lecture Notes in Computer Science, page 541-554. Springer, (2001)Prediction of Mobile Coupon Use: Data Analytics of Influencing Factors., , and . CIKM Workshops, volume 3318 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)An Impression-Based Strategy for Defending Reputation Attacks in Multi-agent Reputation System., , , and . ISCID (2), page 383-388. IEEE, (2016)