Author of the publication

LBS: A Beacon Synchronization Scheme With Higher Schedulability for IEEE 802.15.4 Cluster-Tree-Based IoT Applications.

, , , and . IEEE Internet of Things Journal, 6 (5): 8883-8896 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DPTO: A Deadline and Priority-Aware Task Offloading in Fog Computing Framework Leveraging Multilevel Feedback Queueing., , and . IEEE Internet Things J., 7 (7): 5773-5782 (2020)An Optimized Task Placement in Computational Offloading for Fog-Cloud Computing Networks., , and . ANTS, page 1-5. IEEE, (2019)Challenges and Research Issues of Data Management in IoT for Large-Scale Petrochemical Plants., , , , and . IEEE Syst. J., 12 (3): 2509-2523 (2018)Low-Rank Hypergraph Hashing for Large-Scale Remote Sensing Image Retrieval., , , and . Remote Sensing, 12 (7): 1164 (2020)A Survey on Gas Leakage Source Detection and Boundary Tracking with Wireless Sensor Networks., , , , and . IEEE Access, (2016)Task Data Offloading and Resource Allocation in Fog Computing With Multi-Task Delay Guarantee., , , , , , and . IEEE Access, (2019)A Hardware-Efficient and Reconfigurable UFMC Transmitter Architecture With its FPGA Prototype., , and . IEEE Embed. Syst. Lett., 12 (4): 109-112 (2020)Robust multi-view graph clustering in latent energy-preserving embedding space., , , , , and . Inf. Sci., (2021)A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks., , , , , , and . CoRR, (2024)Honeyword-based Authentication Techniques for Protecting Passwords: A Survey., , , , , , and . ACM Comput. Surv., 55 (8): 169:1-169:37 (2023)