Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opinion polarity detection in Twitter data combining shrinkage regression and topic modeling., , , and . J. Informetrics, 10 (2): 634-644 (2016)Distortion Analysis of Component Composition and Web Service Composition., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 877-884. Springer, (2006)The impact of secondary user mobility and primary user activity on spectrum sensing in cognitive vehicular networks., , and . INFOCOM Workshops, page 588-593. IEEE, (2015)Performance analysis of 802.11b networks in the presence of interference-aware Bluetooth devices., and . QSHINE, page 31. ACM, (2007)A robust malicious user detection scheme in cooperative spectrum sensing., , , and . GLOBECOM, page 4856-4861. IEEE, (2012)Securing Real-Time Opportunistic Spectrum Access in Cognitive Networks against Malicious Secondary Users., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)An Approximately Optimal Rendezvous Scheme for Dynamic Spectrum Access Networks., , , and . GLOBECOM, page 1-5. IEEE, (2011)Depth Estimation From a Single Image Using Guided Deep Network., and . IEEE Access, (2019)The Gerber-Shiu discounted penalty function in the risk process with phase-type interclaim times., , , and . Appl. Math. Comput., 216 (2): 523-531 (2010)Author credit-assignment schemas: A comparison and analysis., , , and . J. Assoc. Inf. Sci. Technol., 67 (8): 1973-1989 (2016)