Author of the publication

GA Based User Matching with Optimal Power Allocation in D2D Underlaying Network.

, , , and . VTC Spring, page 1-5. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial keyword search: a survey., , , and . GeoInformatica, 24 (1): 85-106 (2020)Gravity Effects on Information Filtering and Network Evolving., , , , , and . CoRR, (2013)DPHSim: A Flexible Simulator for DRAM/PCM-Based Hybrid Memory., , , , and . APWeb/WAIM (2), volume 10367 of Lecture Notes in Computer Science, page 319-323. Springer, (2017)Speech Enhancement Algorithm of Binary Mask Estimation Based on a Priori SNR Constraints., , , , and . APSIPA, page 937-943. IEEE, (2018)On scheduling algorithm for device-to-device communication in 60 GHz networks., , , , and . WCNC, page 2474-2479. IEEE, (2014)MagicScaler: Uncertainty-aware, Predictive Autoscaling., , , , , , , , , and 4 other author(s). Proc. VLDB Endow., 16 (12): 3808-3821 (2023)Efficient locality-sensitive hashing over high-dimensional streaming data., , , and . Neural Comput. Appl., 35 (5): 3753-3766 (February 2023)SAL-Hashing: A Self-Adaptive Linear Hashing Index for SSDs., , , , and . IEEE Trans. Knowl. Data Eng., 32 (3): 519-532 (2020)Internal and external memory set containment join., , , , , and . VLDB J., 30 (3): 447-470 (2021)Leopard: A Black-Box Approach for Efficiently Verifying Various Isolation Levels., , , , , , , , , and 1 other author(s). ICDE, page 722-735. IEEE, (2023)