Author of the publication

Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs.

, , and . CSAI/ICIMT, page 468-473. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms and Software for Stochastic Simulation of Biochemical Reacting Systems, , , and . Biotechnology Progress, 24 (1): 56-61 (2008)Stochastic Simulation Algorithms for Chemical Reactions., , and . BIOCOMP, page 431-436. CSREA Press, (2008)A "Resource Package"-Oriented Approach for Remote Sensing Analysis Modeling - Dust Storm Monitoring Model as Example., , , and . International Journal of Software Engineering and Knowledge Engineering, 24 (5): 731-758 (2014)Risk management in Internet Data Center operations under smart grid environment., , , , and . SmartGridComm, page 384-388. IEEE, (2012)Object-Oriented Network: A Named-Data Architecture Toward the Future Internet., , , and . IEEE Internet of Things Journal, 4 (4): 957-967 (2017)A case study on social network in a computer game., , , and . AAMAS, page 954-955. ACM, (2003)Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs., , and . CSAI/ICIMT, page 468-473. ACM, (2018)BEAS: Bounded Evaluation of SQL Queries., , , , , and . SIGMOD Conference, page 1667-1670. ACM, (2017)An Effective Syntax for Bounded Relational Queries., and . SIGMOD Conference, page 599-614. ACM, (2016)Bifurcations in an Internet congestion control system with distributed delay.. Appl. Math. Comput., (2019)