Author of the publication

Evaluation of Key Techniques for Packet Traffics in Multi-Carrier LCR TDD Systems.

, , and . VTC Fall, page 1-5. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion-resilient public cloud auditing scheme with authenticator update., , , and . Inf. Sci., (2020)Linear (2, p, p)-AONTs do Exist., , and . CoRR, (2018)RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 330-344. Springer, (2019)PATH: privacy-preserving auction for heterogeneous spectrum allocations., , , , and . Wireless Networks, 25 (4): 1763-1776 (2019)DDoS detection and defense mechanism based on cognitive-inspired computing in SDN., , , and . Future Gener. Comput. Syst., (2019)Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time"., , and . Future Gener. Comput. Syst., (2018)基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption)., , , and . 计算机科学, 43 (1): 181-185 (2016)GsmPlot: a web server to visualize epigenome data in NCBI., , , , , , and . BMC Bioinform., 21 (1): 55 (2020)Cyclic codes over GR(4m) which are also cyclic over Z4., , and . IEEE Trans. Inf. Theory, 49 (3): 749-758 (2003)SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique., , , , , , and . IEEE Trans. Veh. Technol., 72 (11): 14815-14827 (November 2023)