Author of the publication

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.

, , , , and . Mob. Networks Appl., 24 (4): 1279-1294 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Dynamic Box by Using an Input String., , , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 17-29. Springer, (2017)Heritability of the Specific Cognitive Ability of Face Perception, , , , , , , , and . Current Biology, (Jan 7, 2010)A regional FY-3A VIRR radiance-bias correction scheme for assimilation., , and . IGARSS, page 3288-3291. IEEE, (2011)A 13-bit 160MS/s pipelined subranging-SAR ADC with low-offset dynamic comparator., , , , and . A-SSCC, page 225-228. IEEE, (2017)Remote sensing monitoring of grassland in key region of Northern China., , , , , and . IGARSS, page 3082-3085. IEEE, (2005)Integration of remote sensing and GIS technology to evaluate grassland ecosystem health in north China., , , , , and . IGARSS, page 4034-4037. IEEE, (2004)Proof System for Applied Pi Calculus., and . IFIP TCS, volume 323 of IFIP Advances in Information and Communication Technology, page 229-243. Springer, (2010)Stacked bottleneck features for speaker verification., , and . ChinaSIP, page 514-518. IEEE, (2015)Comparison of fMRI analysis methods for heterogeneous BOLD responses in block design studies., , , , and . NeuroImage, (2017)Exploring k out of Top ρ Fraction of Arms in Stochastic Bandits., , and . CoRR, (2018)