Author of the publication

Context-aware reinforcement learning-based mobile cloud computing for telemonitoring.

, , and . BHI, page 426-429. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stabilizing and boosting I/O performance for file systems with journaling on NVMe SSD., , , , , and . Sci. China Inf. Sci., (2022)Digital Harmonic Detection with Rapid Response and High Steady Precision., , , , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 364-373. Springer, (2017)An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology., , , , and . IEEE Access, (2019)A construction of 1-to-2 shared optical buffer queue with switched delay lines., , , and . IEEE Trans. Commun., 57 (12): 3712-3723 (2009)Efficient Designs of Optical LIFO Buffer with Switches and Fiber Delay Lines., , and . IEEE Trans. Commun., 59 (12): 3430-3439 (2011)Accessing Cloud with Disaggregated Software-Defined Router., , , , , and . NSDI, page 1-14. USENIX Association, (2021)Towards User-Friendly and Efficient Analysis with Alloy., , and . MoDeVVa@MoDELS, volume 1514 of CEUR Workshop Proceedings, page 28-37. CEUR-WS.org, (2015)A Blockchain Scheme Based on DAG Structure Security Solution for IIoT., , , , and . TrustCom, page 935-943. IEEE, (2021)Tuning Target Delay for RTT-based Congestion Control., , , , , and . ICNP, page 1-11. IEEE, (2022)Demo: Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication., , , , and . ICDCS, page 1288-1291. IEEE, (2022)