Showing results 42 to 61 of 64
< previous
next >
Issue Date | Title | Author(s) |
2017-07-28 | Overlay RF-powered backscatter cognitive radio networks: A game theoretic approach | Hoang, DT; Niyato, D; Wang, P; Kim, DI; Le, LB |
2018-01-01 | Pathways to Legalizing Same-Sex Marriage in China and Taiwan: Globalization and “Chinese Values’ | Jeffreys, E; Wang, P; Winter, B; Forest, M; Senac, R |
2018-06-19 | Performance Analysis and Application of Mobile Blockchain | Suankaewmanee, K; Hoang, DT; Niyato, D; Sawadsitang, S; Wang, P; Han, Z |
2016-03-01 | Performance Analysis of Raptor Codes under Maximum Likelihood Decoding | Wang, P; Mao, G; Lin, Z; Ding, M; Liang, W; Ge, X |
2016-03-01 | Performance Impact of LoS and NLoS Transmissions in Dense Cellular Networks | Ding, M; Wang, P; López-Pérez, D; Mao, G; Lin, Z |
2002-01-01 | Practical active network services within content-aware gateways | Subramanian, S; Wang, P; Durairaj, R; Rasimas, J; Travostino, F; Lavian, T; Hoang, D |
2004-01 | Priority Based Dynamic Multiple Robot Path Planning | Zheng, T; Liu, D; Wang, P; Mukhopadhyay, SC; Sen Gupta, G |
2016-11-13 | Proceedings of 2016 International Conference on Behavioral, Economic and Socio-cultural Computing | Li, G; Demazeau, Y; Xu, G; Wang, P; Wang, LSL; Liu, G |
2015-01-01 | PTEN regulates RPA1 and protects DNA replication forks | Wang, G; Li, Y; Wang, P; Liang, H; Cui, M; Zhu, M; Guo, L; Su, Q; Sun, Y; Mcnutt, MA; Yin, Y |
2018-01-01 | Reinforcement Learning Approach for RF-Powered Cognitive Radio Network with Ambient Backscatter | Huynh, NV; Hoang, DT; Nguyen, DN; Dutkiewicz, E; Niyato, D; Wang, P |
2008-02-21 | The role of product involvement in e-service evaluations | Wang, P; Gudergan, S; Lings, I |
2006-01-01 | A service perspective on modelling intentions of on-line purchasing | Hackman, DH; Gudergan, SP; Wang, P; Kerry, D |
2018-08-01 | Stackelberg game for distributed time scheduling in RF-powered backscatter cognitive radio networks | Wang, W; Hoang, DT; Niyato, D; Wang, P; Kim, DI |
2018-06-08 | A stochastic programming approach for risk management in mobile cloud computing | Hoang, DT; Niyato, D; Wang, P; Wang, SS; Nguyen, D; Dutkiewicz, E |
2019-01-01 | A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks | Wang, W; Hoang, DT; Hu, P; Xiong, Z; Niyato, D; Wang, P; Wen, Y; Kim, DI |
2017-12-01 | Temporal Pyramid Pooling-Based Convolutional Neural Network for Action Recognition | Wang, P; Cao, Y; Shen, C; Liu, L; Shen, HT |
2016-01-01 | The tradeoff analysis in RF-powered backscatter cognitive radio networks | Thai, HD; Niyato, D; Wang, P; Kim, DI; Han, Z |
2019-12-07 | Tuning the nanostructure of nitrogen-doped graphene laminates for forward osmosis desalination | Song, JH; Shon, HK; Wang, P; Jang, A; Kim, IS |
2019-05-01 | Unified fine-grained access control for personal health records in cloud computing | Li, W; Liu, BM; Liu, D; Liu, RP; Wang, P; Luo, S; Ni, W |
2016-12-31 | Using best-worst scaling method to examine consumers’ value preferences: A multidimensional perspective | Parvin, S; Wang, P; Uddin, J |