The following pages link to Weijia Jia (Q940197):
Displaying 50 items.
- (Q176427) (redirect page) (← links)
- Delay control and parallel admission algorithms for real-time anycast flow (Q704670) (← links)
- A new delay control method for real-time flows (Q857787) (← links)
- Clustering wireless ad hoc networks with weakly connected dominating set (Q883274) (← links)
- Analysis of reactive routing protocols for mobile ad hoc networks in Markov models (Q940198) (← links)
- Modeling autocorrelation functions of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space (Q1401066) (← links)
- The variety generated by finite locally trivial monoids (Q1597748) (← links)
- Goodness-of-fit tests in linear EV regression with replications (Q1639573) (← links)
- Using nondeterminism to design efficient deterministic algorithms (Q1882527) (← links)
- Theoretical design of decentralized auction framework under mobile crowdsourcing environment (Q2098187) (← links)
- SpamTracer: manual fake review detection for O2O Commercial platforms by using geolocation features (Q2331974) (← links)
- Efficient and secure attribute-based signature for monotone predicates (Q2406435) (← links)
- Connectivity in finite ad-hoc networks (Q2519295) (← links)
- On \(k\)-\(p\)-infix codes (Q2742584) (← links)
- Simulation of self-similar traffic and a TCP traffic simulator (Q2751858) (← links)
- Optimal core selection for multicast tree routing in hypercube networks (Q2751862) (← links)
- QOS routing algorithms for anycast services (Q2751899) (← links)
- The optimal maximal prefix encoding schemes (Q2751964) (← links)
- Vertex cover: Further observations and further improvements (Q2775891) (← links)
- On the Mappings Preserving Equality of 2-Distance (Q2862690) (← links)
- A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks (Q2982339) (← links)
- Analytical Modelling of IEEE 802.11e Enhanced Distributed Channel Access Protocol in Wireless LANs (Q2997798) (← links)
- ON COMPUTATIONAL COMPLEXITY OF HIERARCHICAL OPTIMIZATION (Q3021976) (← links)
- EIHDP: Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems (Q3389950) (← links)
- (Q3610992) (← links)
- (Q4408350) (← links)
- (Q4445809) (← links)
- (Q4451924) (← links)
- Optimal Prefix Codes And Huffman Codes (Q4464415) (← links)
- (Q4472510) (← links)
- (Q4474212) (← links)
- (Q4494080) (← links)
- (Q4506265) (← links)
- Product of Finite Maximal P-Codes. This paper was supported in part by HK UGC grants 9040596, 9040511 and City U Strategic Grants 7001189, 7001060, and by the Natural Science Foundation of China (project No. 60073056) and the Guangdong Provincial Natural (Q4551539) (← links)
- Identity-Based Multi-Proxy Signature Scheme in the Standard Model (Q4589605) (← links)
- Distributed Network Systems (Q4658176) (← links)
- An efficient parameterized algorithm for m-set packing (Q4819697) (← links)
- Optimal synchronous coding (Q4828660) (← links)
- (Q4944990) (← links)
- Just Noticeable Distortion-Based Perceptual Rate Control in HEVC (Q5105773) (← links)
- Novel Packet Size-Based Covert Channel Attacks against Anonymizer (Q5369886) (← links)
- Information and Communications Security (Q5394029) (← links)
- (Q5469552) (← links)
- Multi-shared-trees based multicast routing control protocol using anycast selection (Q5492121) (← links)
- \(k\)-p-infix codes and semaphore codes (Q5931791) (← links)
- A fixed-parameter-tractable algorithm for set packing (Q5957983) (← links)
- Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy (Q6195181) (← links)
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue (Q6488790) (← links)
- Approval-based participatory budgeting with donations (Q6591659) (← links)
- \textsc{Greedy+Max}: an efficient approximation algorithm for \(k\)-submodular knapsack maximization (Q6606191) (← links)