-
1
-
-
84919475079
-
Dynamic channel assignment for wireless sensor networks: A regret matching based approach
-
Jan.
-
J. Chen, et al., "Dynamic channel assignment for wireless sensor networks: A regret matching based approach, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 1, pp. 95-106, Jan. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.1
, pp. 95-106
-
-
Chen, J.1
-
2
-
-
84890331378
-
On energy-efficient trap coverage in wireless sensor networks
-
J. Chen, et al., "On energy-efficient trap coverage in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 10, no. 1, pp. 1-29, 2013.
-
(2013)
ACM Trans. Sensor Netw.
, vol.10
, Issue.1
, pp. 1-29
-
-
Chen, J.1
-
3
-
-
84923172288
-
Impacts of deployment strategies on localization performance in underwater acoustic sensor networks
-
Mar.
-
G. Han, C. Zhang, L. Shu, and J. J. P. C. Rodrigues, "Impacts of deployment strategies on localization performance in underwater acoustic sensor networks, " IEEE Trans. Ind. Electron., vol. 62, no. 3, pp. 1725-1733, Mar. 2015.
-
(2015)
IEEE Trans. Ind. Electron.
, vol.62
, Issue.3
, pp. 1725-1733
-
-
Han, G.1
Zhang, C.2
Shu, L.3
Rodrigues, J.J.P.C.4
-
4
-
-
84941918744
-
Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
-
to be published
-
Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., doi: 10.1109/TNET.2015.2425146, to be published, 2016.
-
(2016)
IEEE/ACM Trans. Netw.
-
-
Zhang, Y.1
He, S.2
Chen, J.3
-
5
-
-
84946086689
-
DOA estimation by covariance matrix sparse reconstruction of coprime array
-
C. Zhou, Z. Shi, Y. Gu, and N. A. Goodman, "DOA estimation by covariance matrix sparse reconstruction of coprime array, " in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), South Brisbane, Qld., Australia, 2015, pp. 2369-2373.
-
(2015)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), South Brisbane, Qld., Australia
, pp. 2369-2373
-
-
Zhou, C.1
Shi, Z.2
Gu, Y.3
Goodman, N.A.4
-
6
-
-
84940484414
-
QoE-ensured price competition model for emerging mobile networks
-
Aug.
-
M. Dong, X. Liu, Z. Qian, A. Liu, and T. Wang, "QoE-ensured price competition model for emerging mobile networks, " IEEE Wireless Commun., vol. 22, no. 4, pp. 50-57, Aug. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.4
, pp. 50-57
-
-
Dong, M.1
Liu, X.2
Qian, Z.3
Liu, A.4
Wang, T.5
-
7
-
-
84944321299
-
Privacy-preserving compressive sensing for crowdsensing based trajectory recovery
-
L. Kong, et al., "Privacy-preserving compressive sensing for crowdsensing based trajectory recovery, " in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), Columbus, OH, USA, 2015, pp. 31-40.
-
(2015)
Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), Columbus, OH, USA
, pp. 31-40
-
-
Kong, L.1
-
8
-
-
84937425876
-
CAMF: Context-Aware message forwarding in mobile social networks
-
Aug.
-
K. Wei, M. Dong, K. Ota, and K. Xu, "CAMF: Context-Aware message forwarding in mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp. 2178-2187, Aug. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.8
, pp. 2178-2187
-
-
Wei, K.1
Dong, M.2
Ota, K.3
Xu, K.4
-
9
-
-
84963692169
-
Device-To-device communication in LTE-Advanced networks: A survey
-
Dec.
-
J. Liu, N. Kato, J. Ma, and N. Kadowaki, "Device-To-device communication in LTE-Advanced networks: A survey, " IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 1923-1940, Dec. 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 1923-1940
-
-
Liu, J.1
Kato, N.2
Ma, J.3
Kadowaki, N.4
-
10
-
-
84876487570
-
Performance modeling for relay cooperation in delay tolerant networks
-
J. Liu, X. Jiang, H. Nishiyama, and N. Kato, "Performance modeling for relay cooperation in delay tolerant networks, " Mobile Netw. Appl., vol. 18, no. 2, pp. 186-194, 2013.
-
(2013)
Mobile Netw. Appl.
, vol.18
, Issue.2
, pp. 186-194
-
-
Liu, J.1
Jiang, X.2
Nishiyama, H.3
Kato, N.4
-
11
-
-
84961990862
-
Big data-driven optimization for mobile networks toward 5G
-
Jan./Feb.
-
K. Zheng, et al., "Big data-driven optimization for mobile networks toward 5G, " IEEE Netw., vol. 30, no. 1, pp. 44-51, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 44-51
-
-
Zheng, K.1
-
12
-
-
84896391856
-
Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints
-
Feb.
-
C. Huang, R. Zhang, and S. Cui, "Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints, " IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 1074-1087, Feb. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.2
, pp. 1074-1087
-
-
Huang, C.1
Zhang, R.2
Cui, S.3
-
13
-
-
84877752789
-
Throughput maximization for the Gaussian relay channel with energy harvesting constraints
-
Aug.
-
C. Huang, R. Zhang, and S. Cui, "Throughput maximization for the Gaussian relay channel with energy harvesting constraints, " IEEE J. Sel. Areas Commun., vol. 31, no. 8, pp. 1469-1479, Aug. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.8
, pp. 1469-1479
-
-
Huang, C.1
Zhang, R.2
Cui, S.3
-
14
-
-
84893305243
-
Location privacy preserving dynamic spectrum auction in cognitive radio network
-
Philadelphia, PA, USA
-
S. Liu, H. Zhu, R. Du, C. Chen, and X. Guan, "Location privacy preserving dynamic spectrum auction in cognitive radio network, " in Proc. IEEE 33rd Int. Conf. Distrib. Comput. Syst. (ICDCS), Philadelphia, PA, USA, 2013, pp. 256-265.
-
(2013)
Proc. IEEE 33rd Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 256-265
-
-
Liu, S.1
Zhu, H.2
Du, R.3
Chen, C.4
Guan, X.5
-
15
-
-
84925082806
-
Multicloud-based evacuation services for emergency management
-
Nov.
-
M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, "Multicloud-based evacuation services for emergency management, " IEEE Cloud Comput., vol. 1, no. 4, pp. 50-59, Nov. 2014.
-
(2014)
IEEE Cloud Comput.
, vol.1
, Issue.4
, pp. 50-59
-
-
Dong, M.1
Li, H.2
Ota, K.3
Yang, L.T.4
Zhu, H.5
-
16
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Feb.
-
L. Wei, et al., "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
-
(2014)
Inf. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
-
17
-
-
84921358942
-
Energy-efficient probabilistic area coverage in wireless sensor networks
-
Jan.
-
Q. Yang, S. He, J. Li, J. Chen, and Y. Sun, "Energy-efficient probabilistic area coverage in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 64, no. 1, pp. 367-377, Jan. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.1
, pp. 367-377
-
-
Yang, Q.1
He, S.2
Li, J.3
Chen, J.4
Sun, Y.5
-
18
-
-
84923528489
-
TOC: Localizing wireless rechargeable sensors with time of charge
-
Art. no. 44
-
Y. Shu, P. Cheng, Y. Gu, J. Chen, and T. He, "TOC: Localizing wireless rechargeable sensors with time of charge, " ACM Trans. Sensor Netw., vol. 11, no. 3, 2015, Art. no. 44.
-
(2015)
ACM Trans. Sensor Netw.
, vol.11
, Issue.3
-
-
Shu, Y.1
Cheng, P.2
Gu, Y.3
Chen, J.4
He, T.5
-
19
-
-
84946949652
-
An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network
-
Dec.
-
G. Han, J. Jiang, L. Shu, and M. Guizani, "An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network, " IEEE Trans. Mobile Comput., vol. 14, no. 12, pp. 2447-2459, Dec. 2015.
-
(2015)
IEEE Trans. Mobile Comput.
, vol.14
, Issue.12
, pp. 2447-2459
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Guizani, M.4
-
20
-
-
84940705050
-
Optimal DoS attack scheduling in wireless networked control system
-
May
-
H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control system, " IEEE Trans. Control Syst. Technol., vol. 24, no. 3, pp. 843-852, May 2016, doi: 10.1109/TCST.2015.2462741.
-
(2016)
IEEE Trans. Control Syst. Technol.
, vol.24
, Issue.3
, pp. 843-852
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.4
-
21
-
-
78650005374
-
-
@ spam: The underground on 140 characters or less Chicago, IL, USA
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@ spam: The underground on 140 characters or less, " in Proc. ACM Conf. Comput. Commun. Security (CCS), Chicago, IL, USA, 2010, pp. 27-37.
-
(2010)
Proc. ACM Conf. Comput. Commun. Security (CCS)
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
22
-
-
74549125111
-
-
More Than $3 Billion Lost to These Attacks. [Online]. Available
-
T. McCall. (2007). Gartner Survey Shows Phishing Attacks Escalated in 2007; More Than $3 Billion Lost to These Attacks. [Online]. Available: http://www.gartner.com/newsroom/id/565125
-
(2007)
Gartner Survey Shows Phishing Attacks Escalated in 2007
-
-
McCall, T.1
-
23
-
-
77953213173
-
Secure collaborative sensing for crowd sourcing spectrum data in white space networks
-
O. Fatemieh, R. Chandra, and C. A. Gunter, "Secure collaborative sensing for crowd sourcing spectrum data in white space networks, " in Proc. IEEE Symp. New Frontiers Dyn. Spectr. Access Netw. (DySPAN), Singapore, 2010, pp. 1-12.
-
(2010)
Proc. IEEE Symp. New Frontiers Dyn. Spectr. Access Netw. (DySPAN), Singapore
, pp. 1-12
-
-
Fatemieh, O.1
Chandra, R.2
Gunter, C.A.3
-
24
-
-
84877639511
-
A robust malicious user detection scheme in cooperative spectrum sensing
-
Dec.
-
C. Chen, M. Song, C. Xin, and M. Alam, "A robust malicious user detection scheme in cooperative spectrum sensing, " in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Anaheim, CA, USA, Dec. 2012, pp. 4856-4861.
-
(2012)
Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Anaheim, CA, USA
, pp. 4856-4861
-
-
Chen, C.1
Song, M.2
Xin, C.3
Alam, M.4
-
25
-
-
84878390310
-
Neighbor-based malicious node detection in wireless sensor networks
-
S.-J. Yim and Y.-H. Choi, "Neighbor-based malicious node detection in wireless sensor networks, " Wireless Sensor Netw., vol. 4, no. 9, pp. 219-225, 2012.
-
(2012)
Wireless Sensor Netw.
, vol.4
, Issue.9
, pp. 219-225
-
-
Yim, S.-J.1
Choi, Y.-H.2
-
26
-
-
35549010227
-
Using sensorranks for in-network detection of faulty readings in wireless sensor networks
-
X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee, "Using sensorranks for in-network detection of faulty readings in wireless sensor networks, " in Proc. ACM Int. Workshop Data Eng. WiWless Mobile Access (MobiDE), Beijing, China, 2007, pp. 1-8.
-
(2007)
Proc. ACM Int. Workshop Data Eng. WiWless Mobile Access (MobiDE), Beijing, China
, pp. 1-8
-
-
Xiao, X.-Y.1
Peng, W.-C.2
Hung, C.-C.3
Lee, W.-C.4
-
27
-
-
84938388237
-
Malicious node detection using a dual threshold in wireless sensor networks
-
S. Y. Lim and Y.-H. Choi, "Malicious node detection using a dual threshold in wireless sensor networks, " J. Sensor Actuator Netw., vol. 2, no. 1, pp. 70-84, 2013.
-
(2013)
J. Sensor Actuator Netw.
, vol.2
, Issue.1
, pp. 70-84
-
-
Lim, S.Y.1
Choi, Y.-H.2
-
28
-
-
84881467197
-
Improving location reliability in crowd sensed data with minimal efforts
-
Apr.
-
M. Talasila, R. Curtmola, and C. Borcea, "Improving location reliability in crowd sensed data with minimal efforts, " in Proc. Joint IFIP Wireless Mobile Netw. Conf. (WMNC), Dubai, UAE, Apr. 2013, pp. 1-8.
-
(2013)
Proc. Joint IFIP Wireless Mobile Netw. Conf. (WMNC), Dubai, UAE
, pp. 1-8
-
-
Talasila, M.1
Curtmola, R.2
Borcea, C.3
-
29
-
-
84868121729
-
A multivariate classification algorithm for malicious node detection in large-scale WSNs
-
H. Dai, H. Liu, Z. Jia, and T. Chen, "A multivariate classification algorithm for malicious node detection in large-scale WSNs, " in Proc. IEEE Int. Conf. Trust Security Privacy Comput. Commun. (TrustCom), Liverpool, U.K., 2013, pp. 239-245.
-
(2013)
Proc. IEEE Int. Conf. Trust Security Privacy Comput. Commun. (TrustCom), Liverpool, U.K.
, pp. 239-245
-
-
Dai, H.1
Liu, H.2
Jia, Z.3
Chen, T.4
-
30
-
-
85019012252
-
Decentralised malicious node detection in WSN
-
A. Atassi, N. Sayegh, I. H. Elhajj, A. Chehab, and A. Kayssi, "Decentralised malicious node detection in WSN, " Int. J. Space Based Situated Comput., vol. 4, no. 1, pp. 15-25, 2014.
-
(2014)
Int. J. Space Based Situated Comput.
, vol.4
, Issue.1
, pp. 15-25
-
-
Atassi, A.1
Sayegh, N.2
Elhajj, I.H.3
Chehab, A.4
Kayssi, A.5
-
31
-
-
84945315428
-
Optimal denial-of-service attack scheduling with energy constraint
-
Nov.
-
H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal denial-of-service attack scheduling with energy constraint, " IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023-3028, Nov. 2015.
-
(2015)
IEEE Trans. Autom. Control
, vol.60
, Issue.11
, pp. 3023-3028
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.4
-
32
-
-
84896396765
-
Curve-based deployment for barrier coverage in wireless sensor networks
-
Feb.
-
S. He, X. Gong, J. Zhang, J. Chen, and Y. Sun, "Curve-based deployment for barrier coverage in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 724-735, Feb. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.2
, pp. 724-735
-
-
He, S.1
Gong, X.2
Zhang, J.3
Chen, J.4
Sun, Y.5
-
33
-
-
78751502334
-
Detecting spammers on social networks
-
G. Stringhini, C. Kruegel, and G. Vigna, "Detecting spammers on social networks, " in Proc. ACM Annu. Comput. Security Appl. Conf. (ACSAC), Austin, TX, USA, 2010, pp. 1-9.
-
(2010)
Proc. ACM Annu. Comput. Security Appl. Conf. (ACSAC), Austin, TX, USA
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
34
-
-
84938687806
-
Detecting malicious users in Twitter using classifiers
-
M. Singh, D. Bansal, and S. Sofat, "Detecting malicious users in Twitter using classifiers, " in Proc. ACM Int. Conf. Security Inf. Netw. (SIN), Glasgow, U.K., 2014, pp. 247-253.
-
(2014)
Proc. ACM Int. Conf. Security Inf. Netw. (SIN), Glasgow, U.K.
, pp. 247-253
-
-
Singh, M.1
Bansal, D.2
Sofat, S.3
-
35
-
-
84953807120
-
6 million spam tweets: A large ground truth for timely Twitter spam detection
-
C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou, "6 million spam tweets: A large ground truth for timely Twitter spam detection, " in Proc. IEEE Int. Conf. Commun. (ICC), London, U.K., 2015, pp. 7065-7070.
-
(2015)
Proc. IEEE Int. Conf. Commun. (ICC), London, U.K.
, pp. 7065-7070
-
-
Chen, C.1
Zhang, J.2
Chen, X.3
Xiang, Y.4
Zhou, W.5
-
36
-
-
84856170135
-
A survey of crowdsourcing systems
-
M.-C. Yuen, I. King, and K.-S. Leung, "A survey of crowdsourcing systems, " in Proc. IEEE Int. Conf. Privacy Security Risk Trust IEEE Int. Conf. Soc. Comput. (PASSAT/SocialCom), Boston, MA, USA, 2011, pp. 766-773.
-
(2011)
Proc. IEEE Int. Conf. Privacy Security Risk Trust IEEE Int. Conf. Soc. Comput. (PASSAT/SocialCom), Boston, MA, USA
, pp. 766-773
-
-
Yuen, M.-C.1
King, I.2
Leung, K.-S.3
-
37
-
-
84996531373
-
Statistical quality estimation for general crowdsourcing tasks
-
Y. Baba and H. Kashima, "Statistical quality estimation for general crowdsourcing tasks, " in Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min. (KDD), Chicago, IL, USA, 2013, pp. 554-562.
-
(2013)
Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min. (KDD), Chicago, IL, USA
, pp. 554-562
-
-
Baba, Y.1
Kashima, H.2
-
38
-
-
84903577325
-
Device-To-device communications achieve efficient load balancing in LTE-Advanced networks
-
Apr.
-
J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, "Device-To-device communications achieve efficient load balancing in LTE-Advanced networks, " IEEE Wireless Commun., vol. 21, no. 2, pp. 57-65, Apr. 2014.
-
(2014)
IEEE Wireless Commun.
, vol.21
, Issue.2
, pp. 57-65
-
-
Liu, J.1
Kawamoto, Y.2
Nishiyama, H.3
Kato, N.4
Kadowaki, N.5
-
40
-
-
84894426605
-
Cooperative spectrum sharing: A contract-based approach
-
Jan.
-
L. Duan, L. Gao, and J. Huang, "Cooperative spectrum sharing: A contract-based approach, " IEEE Trans. Mobile Comput., vol. 13, no. 1, pp. 174-187, Jan. 2014.
-
(2014)
IEEE Trans. Mobile Comput.
, vol.13
, Issue.1
, pp. 174-187
-
-
Duan, L.1
Gao, L.2
Huang, J.3
-
41
-
-
84943650941
-
Performance of target tracking in radar network system under deception attack
-
C. Yang, H. Zhang, F. Qu, and Z. Shi, "Performance of target tracking in radar network system under deception attack, " in Proc. Int. Conf. Wireless Algorithms Syst. Appl. (WASA), Qufu, China, 2015, pp. 664-673.
-
(2015)
Proc. Int. Conf. Wireless Algorithms Syst. Appl. (WASA), Qufu, China
, pp. 664-673
-
-
Yang, C.1
Zhang, H.2
Qu, F.3
Shi, Z.4
-
42
-
-
84971014154
-
Delay-optimal dynamic mode selection and resource allocation in device-To-device communications-Part II: Practical algorithm
-
to be published
-
L. Lei, et al., "Delay-optimal dynamic mode selection and resource allocation in device-To-device communications-Part II: Practical algorithm, " IEEE Trans. Veh. Technol., doi: 10.1109/TVT.2015.2444791, to be published, 2016.
-
(2016)
IEEE Trans. Veh. Technol.
-
-
Lei, L.1
-
43
-
-
84870266614
-
Optimal forwarding games in mobile ad hoc networks with two-hop f-cast relay
-
Dec.
-
J. Liu, et al., "Optimal forwarding games in mobile ad hoc networks with two-hop f-cast relay, " IEEE J. Sel. Areas Commun., vol. 30, no. 11, pp. 2169-2179, Dec. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.11
, pp. 2169-2179
-
-
Liu, J.1
-
44
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, " in Proc. ACM Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), Boston, MA, USA, 2000, pp. 255-265.
-
(2000)
Proc. ACM Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), Boston, MA, USA
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
45
-
-
38549088052
-
Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
-
N. Nasser and Y. Chen, "Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks, " in Proc. IEEE Int. Conf. Commun. (ICC), Glasgow, U.K., 2007, pp. 1154-1159.
-
(2007)
Proc. IEEE Int. Conf. Commun. (ICC), Glasgow, U.K.
, pp. 1154-1159
-
-
Nasser, N.1
Chen, Y.2
-
46
-
-
84868112157
-
EAACK-A secure intrusion-detection system for MANETs
-
Mar.
-
E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK-A secure intrusion-detection system for MANETs, " IEEE Trans. Ind. Electron., vol. 60, no. 3, pp. 1089-1098, Mar. 2013.
-
(2013)
IEEE Trans. Ind. Electron.
, vol.60
, Issue.3
, pp. 1089-1098
-
-
Shakshuki, E.M.1
Kang, N.2
Sheltami, T.R.3
|