Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grey Target Tracking and Self-Healing on Vehicular Sensor Networks., and . EURASIP J. Wireless Comm. and Networking, (2007)Controlled remote state preparation protocols via AKLT states., and . Quantum Inf. Process., 13 (7): 1639-1650 (2014)Controlled probabilistic quantum key distribution using a ground state., and . Quantum Inf. Process., 14 (3): 989-1003 (2015)A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?, , and . HICSS, page 4858-4867. IEEE Computer Society, (2014)Impact of Information Technology Capability on Financial Performance of Chinese Listed Companies during the Period of Economic Downturn., , and . WHICEB, page 43. Association for Information Systems, (2014)Security Design Based on Social Modeling., , and . COMPSAC (2), page 71-78. IEEE Computer Society, (2006)0-7695-2655-1.Performance modeling for real-time content adaptation network., , and . IRI, page 444-447. IEEE Systems, Man, and Cybernetics Society, (2006)Joint Interference Suppression for Multi-User TDD MIMO Downlink with Other-Cell Interference., , , and . IEEE Communications Letters, 16 (3): 307-309 (2012)An RDF-based annotation framework for providing web resources integrity., , and . IRI, page 99-104. IEEE Systems, Man, and Cybernetics Society, (2006)Content Consistency Model for Pervasive Internet Access., , and . Advances in Web Intelligence and Data Mining, volume 23 of Studies in Computational Intelligence, Springer, (2006)