×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [1]
Authors
MA SHAODAN [1]
Document Type
Conference paper [5]
Date Issued
2013 [2]
2011 [1]
2004 [2]
Language
英語English [5]
Source Publication
GLOBECOM - IEEE ... [5]
Indexed By
CPCI-S [2]
SCIE [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-5 of 5
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Throughput evaluation for cooperative drive-thru internet using microscopic mobility model
Conference paper
Zhou, Haibo, Liu, Bo, Luan, Tom H., Hou, Fen, Gui, Lin, Li, Ying, Shen, Xuemin. Throughput evaluation for cooperative drive-thru internet using microscopic mobility model[C]. Institute of Electrical and Electronics Engineers Inc., 2013, 371-376.
Authors:
Zhou, Haibo
;
Liu, Bo
;
Luan, Tom H.
;
Hou, Fen
;
Gui, Lin
; et al.
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
|
Submit date:2018/11/06
Outage analysis of opportunistic amplify-and-forward cooperative cellular systems with random relays
Conference paper
Ding H., Yang G.-H., Ma S., Xing C., Fei Z., Gao F.. Outage analysis of opportunistic amplify-and-forward cooperative cellular systems with random relays[C], 2013, 4293-4298.
Authors:
Ding H.
;
Yang G.-H.
;
Ma S.
;
Xing C.
;
Fei Z.
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
3
|
Submit date:2019/02/14
On a hierarchical false data injection attack on power system state estimation
Conference paper
Yang, Qinyu, Yang, Jie, Yu, Wei, Zhang, Nan, Zhao, Wei. On a hierarchical false data injection attack on power system state estimation[C]. Institute of Electrical and Electronics Engineers Inc., 2011.
Authors:
Yang, Qinyu
;
Yang, Jie
;
Yu, Wei
;
Zhang, Nan
;
Zhao, Wei
Favorite
|
TC[WOS]:
0
TC[Scopus]:
21
|
Submit date:2018/11/06
Achieving proportional degradation areas for wireless adaptive multimedia networks
Conference paper
Xiao Y., Li H., Chen C.L.P., Wang B., Pan Y.. Achieving proportional degradation areas for wireless adaptive multimedia networks[C], 2004, 507-510.
Authors:
Xiao Y.
;
Li H.
;
Chen C.L.P.
;
Wang B.
;
Pan Y.
Favorite
|
|
Submit date:2019/02/11
A scalable and efficient end host multicast protocol for peer-to-peer systems - DSCT
Conference paper
Wanqing Tu, Weijia Jia. A scalable and efficient end host multicast protocol for peer-to-peer systems - DSCT[C], 2004, 967-971.
Authors:
Wanqing Tu
;
Weijia Jia
Favorite
|
TC[WOS]:
9
TC[Scopus]:
16
|
Submit date:2019/02/11