Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algebraic System for Deadlock Detection and its Applications., , and . Symposium on Reliability in Distributed Software and Database Systems, page 177-184. IEEE Computer Society, (1984)A Cross-Layer Architecture for DiffServ in Mobile Ad-hoc Networks, , and . page 513-522. (2005)PCBA: A Priority-Based Competitive Broadcasting Algorithm in Mobile Ad Hoc Networks., , , and . J. Comput. Sci. Technol., 18 (5): 598-606 (2003)A k-Round Elimination Contention Scheme for WLANs., , and . IEEE Trans. Mob. Comput., 6 (11): 1230-1244 (2007)A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks., , , , and . EURASIP J. Wireless Comm. and Networking, 2005 (5): 645-660 (2005)The Research on the Modeling Transformation from GBMS to jBPM., and . CSSE (2), page 485-490. IEEE Computer Society, (2008)978-0-7695-3336-0.A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 277-289. Springer, (2011)Research on Enterprise Modeling of Agile Manufacturing., , and . EDCIS, volume 2480 of Lecture Notes in Computer Science, page 247-256. Springer, (2002)Software Research and Development in China.. IEEE Softw., 6 (2): 53-55 (1989)A Distributed Contention Vector Division Multiple Access (D-CVDMA) Protocol for Wireless Networks., and . IEEE Trans. Mob. Comput., 9 (7): 1049-1054 (2010)