Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized LSB Matching Steganography Based on Fisher Information., , , and . J. Multim., 7 (4): 295-302 (2012)General, practical, and accurate models for the performance analysis of cache cascades., , , , and . Sci. China Inf. Sci., 60 (4): 49302 (2017)Dynamic classifier approximation for unsupervised domain adaptation., , , , and . Signal Process., (May 2023)ProCTA: program characteristic-based thread partition approach., , , , , , and . J. Supercomput., 75 (11): 7366-7390 (2019)Incentive mechanism for cooperative content discovery in mobile wireless networks: A repeated cooperative game-theoretic approach., , , , , , and . ISCC, page 727-731. IEEE Computer Society, (2015)A service collaboration method based on mobile edge computing in internet of things., , , and . Multim. Tools Appl., 82 (5): 6505-6529 (February 2023)TPAoPI: A Thread Partitioning Approach Based on Procedure Importance in Speculative Multithreading., , , and . HPCC/SmartCity/DSS, page 2339-2344. IEEE, (2019)A Novel Recovery Strategy for Service Interruption in Ubiquitous Stub Environment., , , and . VTC Spring, page 1-5. IEEE, (2014)A service recovery method based on trust evaluation in mobile social network., , , and . Multim. Tools Appl., 76 (3): 3255-3277 (2017)ParaCA: A Speculative Parallel Crawling Approach on Apache Spark., , , and . ICA3PP (1), volume 12452 of Lecture Notes in Computer Science, page 112-124. Springer, (2020)