Author of the publication

Improving Chinese Storing Text Retrieval Systems' Security via a Novel Maximal Prefix Coding.

, , , and . Int. J. Comput. Process. Orient. Lang., 15 (4): 379-393 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Aware Routing Analysis in Wireless Sensors Network., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 345-349. Springer, (2006)An Efficient Fibonacci Series Based Hierarchical Application-Layer Multicast Protocol., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 131-142. Springer, (2006)Effective Admission Control for Real-Time Anycast Flow., , and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 228-238. Springer, (2003)Techno-economic analysis and prediction for the deployment of 5G mobile network., and . ICIN, page 9-16. IEEE, (2017)Online Joint Scheduling of Delay-Sensitive and Computation-Oriented Tasks in Edge Computing., , , and . MSN, page 303-308. IEEE, (2019)An efficient admission control for IEEE 802.11 networks based on throughput analyses of (un)saturated channel., , and . Int. J. Commun. Syst., 21 (7): 755-771 (2008)Design and analysis of an efficient and reliable atomic multicast protocol., , , and . Comput. Commun., 21 (1): 37-53 (1998)Using Nondeterminism to Design Efficient Deterministic Algorithms., , , and . Algorithmica, 40 (2): 83-97 (2004)Spatial-Temporal Self-Attention Network for Flow Prediction., , , and . CoRR, (2019)Vertex Cover: Further Observations and Further Improvements., , and . J. Algorithms, 41 (2): 280-301 (2001)