Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jianhan Song"'
Autor:
Jing Wei, Fangzheng Guo, Yamin Song, Tong Feng, Ying Wang, Kun Xu, Jianhan Song, Eldana Kaysar, Reyima Abdukayyum, Feiyang Lin, Kangsheng Li, Baiqing Li, Zhongqing Qian, Xiaojing Wang, Hongtao Wang, Tao Xu
Publikováno v:
Cellular & Molecular Biology Letters, Vol 29, Iss 1, Pp 1-18 (2024)
Abstract Background Mycobacterium tuberculosis heat-resistant antigen (Mtb-HAg) is a peptide antigen released from the mycobacterial cytoplasm into the supernatant of Mycobacterium tuberculosis (Mtb) attenuated H37Ra strain after autoclaving at 121
Externí odkaz:
https://doaj.org/article/7b73b282dd6c40389ffa45d69701539e
Publikováno v:
IEEE/ACM Transactions on Networking. 30:487-500
In this paper, we study learning-assisted multi-user scheduling for the wireless downlink. There have been many scheduling algorithms developed that optimize for a plethora of performance metrics; however a systematic approach across diverse performa
Publikováno v:
Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing.
Publikováno v:
IEEE Transactions on Communications. 68:7473-7484
We consider the problem of stealthy communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links.
Publikováno v:
IEEE Transactions on Smart Grid. 11:821-831
The increasing deployment of distribution-level phasor measurement units (PMUs) calls for dynamic distribution state estimation (DDSE) approaches that tap into high-rate measurements to maintain a comprehensive view of the distribution-system state i
Publikováno v:
ACM SIGMETRICS Performance Evaluation Review. 49:8-9
We study a learning-based hierarchical scheduling framework in support of network slicing for cellular networks. This addresses settings where users and/or service classes are grouped into slices, and resources are allocated hierarchically. The hiera
Publikováno v:
ISIT
We consider the problem of stealth communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. W
Publikováno v:
2016 IEEE International Conference on Acoustics, Speech & Signal Processing (ICASSP); 2016, p6200-6204, 5p