Author of the publication

Linear Optimal Hierarchical Multicast Tree Algorithms for P2P Database.

, , , and . MSN, page 242-249. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game and Balance Multicast Architecture Algorithms for Sensor Grid., , , , , and . Sensors, 9 (9): 7177-7202 (2009)Multi-path QoS Routing in TDMA/CDMA Ad Hoc Wireless Networks., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 609-616. Springer, (2004)Phrase-Based Statistical Language Modeling from Bilingual Parallel Corpus., , and . ESCAPE, volume 4614 of Lecture Notes in Computer Science, page 317-328. Springer, (2007)A Preference Method with Fuzzy Logic in Service Scheduling of Grid Computing., , , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 865-871. Springer, (2005)A Novel Technique for Detecting DDoS Attacks at Its Early Stage., , and . ISPA, volume 3358 of Lecture Notes in Computer Science, page 825-834. Springer, (2004)A Hybrid Sentence Ordering Strategy in Multi-document Summarization., , , , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 339-349. Springer, (2006)基于群体智慧的软件开发间层模型及其架构实现 (Interlayer Model for Software Development Based on Collective Intelligence and its Architecture Implementation)., , , , , and . 计算机科学, 42 (1): 175-179 (2015)A novel approach to detecting DDoS Attacks at an Early Stage., , and . J. Supercomput., 36 (3): 235-248 (2006)Accelerating Columnar Storage Based on Asynchronous Skipping Strategy., , , , , and . Big Data Res., (February 2023)TinyAKE: A More Practicable and Trustable Scheme for Authenticated Key Establishment in WSNs., , , , , and . CoRR, (2021)