Author of the publication

An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping.

, , and . CSSE (3), page 116-120. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semantic-Driven Cache Management Approach for Mobile Applications., , , and . International Conference on Computational Science (3), volume 3993 of Lecture Notes in Computer Science, page 184-191. Springer, (2006)Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1307-1319 (2021)An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping., , and . CSSE (3), page 116-120. IEEE Computer Society, (2008)978-0-7695-3336-0.Dynamic spectrum access for Internet-of-Things with joint GNN and DQN., , , , and . Ad Hoc Networks, (August 2024)The Design and Implementation of Extensible Information Services., , , and . International Conference on Computational Science (1), volume 3514 of Lecture Notes in Computer Science, page 987-994. Springer, (2005)LD-BSCA: A local-density based spatial clustering algorithm., and . CIDM, page 291-298. IEEE, (2009)Novel conic-based group signature scheme with revocation., , , and . FSKD, page 2623-2627. IEEE, (2011)Multi-Use Unidirectional Proxy Re-Encryption., , , and . ICC, page 1-5. IEEE, (2011)Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption., , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 495-508. Springer, (2016)A Budget-Based Cost-Effective Incentive Model., , , and . ICPP Workshops, page 449-456. IEEE Computer Society, (2009)