Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mend Barrier Gaps via Sensor Rotation for a Line-Based Deployed Directional Sensor Network., , , , and . HPCC/EUC, page 2074-2079. IEEE, (2013)An evaluation of user importance when integrating social networks and mobile cloud computing., , , , and . GLOBECOM, page 2935-2940. IEEE, (2014)Special Section on Privacy Computing: Principles and Applications., and . Inf. Sci., (2020)LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment., , , and . IEEE Trans. Ind. Informatics, 15 (4): 2469-2477 (2019)Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications., , and . IEEE Trans. Emerg. Top. Comput., 8 (1): 69-81 (2020)Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network., , , , and . IEEE Trans. Emerg. Top. Comput., 3 (1): 84-94 (2015)FITDOC: fast virtual machines checkpointing with delta memory compression., , , , and . J. Supercomput., 72 (9): 3328-3347 (2016)A subcarrier modulation based optical wireless communication system employing transmission diversity., , , and . J. Supercomput., 66 (3): 1306-1319 (2013)ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks., , , and . J. Supercomput., 64 (3): 744-761 (2013)Special issue on big data intelligence in communication systems., , and . Int. J. Commun. Syst., (2018)