Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure data hiding scheme for binary images., , and . IEEE Trans. Commun., 50 (8): 1227-1231 (2002)Data broadcasting and seamless channel transition for highly demanded videos., , , , and . IEEE Trans. Commun., 49 (5): 863-874 (2001)A recursive frequency-splitting scheme for broadcasting hot videos in VOD service., , and . IEEE Trans. Commun., 50 (8): 1348-1355 (2002)All-to-All Personalized Communication in a Wormhole-Routed Torus., and . IEEE Trans. Parallel Distributed Syst., 7 (5): 498-505 (1996)Balanced Spanning Trees in Complete and Incomplete Star Graphs., , and . IEEE Trans. Parallel Distributed Syst., 7 (7): 717-723 (1996)Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks., , , and . Mob. Networks Appl., 10 (1-2): 169-181 (2005)Design and Implementation of a Communication-Efficient Data-Parallel Program Compiling System., , , and . J. Inf. Sci. Eng., 17 (5): 825-839 (2001)Embedding a Ring in a Hypercube with Both Faulty Links and Faulty Nodes.. Inf. Process. Lett., 59 (4): 217-222 (1996)Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks., , , and . VTC Fall, page 362-366. IEEE, (2007)Cross-Layer, Energy-Efficient Design for Supporting Continuous Queries in Wireless Sensor Networks: A Quorum-Based Approach., , , and . Wireless Personal Communications, 51 (3): 411-426 (2009)