Author of the publication

An Opportunistic Network Coding Routing for Opportunistic Networks.

, , , , and . Int. J. Parallel Program., 45 (1): 157-171 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BSTBGA: A hybrid genetic algorithm for constrained multi-objective optimization problems., and . Comput. Oper. Res., 40 (1): 282-302 (2013)The Innovation of Ideological and Political Education Integrating Artificial Intelligence Big Data with the Support of Wireless Network., , and . Appl. Artif. Intell., (December 2023)Hole mobility in InSb-based devices: Dependency on surface orientation, body thickness and strain., , , and . ESSDERC, page 122-125. IEEE, (2014)Multi-bit Leveled Homomorphic Encryption via Dual.LWE -Based., , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 221-242. Springer, (2016)Modelling, variation monitoring, analyzing, reasoning for intelligently reconfigurable Clinical Pathway., , , , and . SOLI, page 85-90. IEEE, (2009)Optimizing Joint Production Planning, Pricing and Retailer Selection with Emission Control based on Stackelberg Game and Nested Genetic Algorithm., , , and . IEEM, page 199-203. IEEE, (2019)Dynamic postponement design for crowdsourcing in open manufacturing: A hierarchical joint optimization approach., , and . IISE Trans., 52 (3): 255-275 (2020)Joint optimization for coordinated configuration of product families and supply chains by a leader-follower Stackelberg game., , , , , and . Eur. J. Oper. Res., 246 (1): 263-280 (2015)Research on the method for interval linear bi-level programming based on a partial order on intervals., and . FSKD, page 682-686. IEEE, (2011)Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme., , , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 256-267. Springer, (2017)