Yeqing Wu

According to our database1, Yeqing Wu authored at least 12 papers between 2012 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Optimal Spectrum Handoff Control for CRN Based on Hybrid Priority Queuing and Multi-Teacher Apprentice Learning.
IEEE Trans. Vehicular Technology, 2017

Apprenticeship Learning Based Spectrum Decision in Multi-Channel Wireless Mesh Networks with Multi-Beam Antennas.
IEEE Trans. Mob. Comput., 2017

2015
Non-informative hierarchical Bayesian inference for non-negative matrix factorization.
Signal Processing, 2015

Failure analysis on reflector blackening between lead frame electrodes in LEDs under WHTOL test.
Microelectronics Reliability, 2015

2014
Primate-inspired adaptive routing in intermittently connected mobile communication systems.
Wireless Networks, 2014

Cross-Layer Forward Error Correction Scheme Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels.
IEEE Trans. Circuits Syst. Video Techn., 2014

A Learning-Based QoE-Driven Spectrum Handoff Scheme for Multimedia Transmissions over Cognitive Radio Networks.
IEEE Journal on Selected Areas in Communications, 2014

Measuring activities and counting steps with the SmartSocks - An unobtrusive and accurate method.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2014

2013
A Fast Raptor Codes Decoding Strategy for Real-Time Communication Systems.
Netw. and Communic. Technol., 2013

Feature-based compressive signal processing (CSP) measurement design for the pattern analysis of Cognitive Radio spectrum.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Spectrum handoffs with mixed-priority queueing model over Cognitive Radio Networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case.
J. Information Security, 2012


  Loading...