default search action
Peng Feng 0003
Person information
- affiliation: Beihang University, School of Computer Science and Engineering, Beijing, China
- affiliation: Guangxi University, School of Computer and Electronics Information, Nanning, China
Other persons with the same name
- Peng Feng — disambiguation page
- Peng Feng 0001 — Chinese Academy of Sciences, Institute of Semiconductors, Beijing, China (and 1 more)
- Peng Feng 0002 — Chongqing University, Key Laboratory of Optoelectronic Technology and Systems, Ministry of Education, China
- Peng Feng 0004 — Florida Gulf Coast University, Department of Mathematics, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j4]Peng Feng, Yuebin Bai, Yuhao Gu, Jun Huang, Xiaolin Wang, Chang Liu:
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks. Comput. Commun. 166: 234-243 (2021) - [j3]Weitao Wang, Yuebin Bai, Peng Feng, Jun Huang, Mo Sha, Jianpei Tantai:
DTN-Balance: A Forwarding-Capacity and Forwarding-Queue Aware Routing for Self-organizing DTNs. Wirel. Pers. Commun. 118(1): 575-598 (2021) - [c6]Peng Feng, Yuebin Bai, Zerui Guo, Xiaolin Wang, Yining Zhang, Bojian Bai, Junmin Zhang:
A Millimeter-wave Multi-channel MAC with Dynamic Spectrum Access Capability for Mobile Self-organizing Heterogeneous Networks. IPCCC 2021: 1-7
2010 – 2019
- 2019
- [j2]Peng Feng, Yuebin Bai, Jun Huang, Weitao Wang, Yuhao Gu, Shuai Liu:
CogMOR-MAC: A cognitive multi-channel opportunistic reservation MAC for multi-UAVs ad hoc networks. Comput. Commun. 136: 30-42 (2019) - 2018
- [c5]Weitao Wang, Yuebin Bai, Peng Feng, Yuhao Gu, Shuai Liu, Wenhao Jiang, Jun Huang:
DTN-Knca: A High Throughput Routing Based on Contact Pattern Detection in DTNs. COMPSAC (1) 2018: 926-931 - [c4]Xudong Zhang, Yuebin Bai, Peng Feng, Weitao Wang, Shuai Liu, Wenhao Jiang, Junfang Zeng, Rui Wang:
Network Alarm Flood Pattern Mining Algorithm Based on Multi-dimensional Association. MSWiM 2018: 71-78 - [c3]Yuebin Bai, Xu Shao, Wentao Yang, Weitao Wang, Peng Feng, Shuai Liu, Xudong Zhang, Rui Wang:
Nodes contact probability estimation approach based on Bayesian network for DTN. NOMS 2018: 1-4 - [c2]Weitao Wang, Yuebin Bai, Chao Yu, Yuhao Gu, Peng Feng, Xiaojing Wang, Rui Wang:
A network traffic flow prediction with deep learning approach for large-scale metropolitan area network. NOMS 2018: 1-9 - 2014
- [j1]Gaocai Wang, Ying Peng, Peng Feng, Nao Wang:
An energy consumption minimization routing scheme based on rate adaptation with QoS guarantee for the mobile environment. Comput. Networks 74: 48-57 (2014) - 2013
- [c1]Peng Feng, Gaocai Wang, Nao Wang, Daofeng Li:
An Energy Efficient Optimization Routing Strategy Based on Rate Adaptation. HPCC/EUC 2013: 1391-1399
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint