Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networking and application interface technology for wireless sensor network surveillance and monitoring., , and . IEEE Communications Magazine, 49 (10): 90-97 (2011)Computational Experience of an Interior-Point Algorithm in a Parallel Branch-and-Cut Framework., and . PPSC, SIAM, (1997)On conic QPCCs, conic QCQPs and completely positive programs., , and . Math. Program., 159 (1-2): 109-136 (2016)On convex quadratic programs with linear complementarity constraints., , and . Comput. Optim. Appl., 54 (3): 517-554 (2013)Low-rank factorization for rank minimization with nonconvex regularizers., and . Comput. Optim. Appl., 79 (2): 273-300 (2021)VIGILANT+: mission objective interest groups for wireless sensor network surveillance applications., , and . IET Wirel. Sens. Syst., 1 (4): 229-240 (2011)Performance increase through the use of multiple sub-carriers in WSN., , and . MOBIWAC, page 132-139. ACM, (2009)Transparent wireless access to optical WDM networks using a novel coherent radio-over-fiber (CRoF) approach., , and . ICTON, page 1-2. IEEE, (2014)DWDM-PON/mm-Wave wireless converged Next Generation Access Topology using coherent heterodyne detection., , , , and . ICTON, page 1-3. IEEE, (2014)Using quadratic convex reformulation to tighten the convex relaxation of a quadratic program with complementarity constraints., , and . Optim. Lett., 8 (3): 811-822 (2014)