The following publications are possibly variants of this publication:
- Extended Delivery Time Analysis for Secondary Packet Transmission With Adaptive Modulation Under Interweave Cognitive ImplementationWen Jing Wang, Muneer Usman, Hong-Chuan Yang, Mohamed-Slim Alouini. tccn, 3(2):180-189, 2017. [doi]
- A Model-Based Framework for Adapting Interaction Mismatches of Time-Aware Web ServicesGuangquan Zhang, Sheng Wang, Mei Rong, Qingchun Li. service 2010: 76-81 [doi]
- Service Time Analysis of Secondary Packet Transmission with Opportunistic Channel AccessMuneer Usman, Hong-Chuan Yang, Mohamed-Slim Alouini. vtc 2014: 1-5 [doi]
- Value Annotation for Service Model AnalysisZhongjie Wang, Xiaofei Xu, Dian-Hui Chu, Chao Ma, Xu Shao. service 2010: 219-225 [doi]
- Service dependency mining method based on service call chain analysisYuanyuan Lan, Lei Fang, Mingzhu Zhang, Jianhua Su, Zhongguo Yang, Han Li. service 2021: 84-89 [doi]
- The Risk Analysis on IT Service Outsourcing of Enterprise with System DynamicsGui-sen Wang, Xiang-Yang Li. service 2010: 304-308 [doi]
- Agent Based Decomposition for Service Change Request AnalysisYabin Dang, Hao Chen, Feng Li, Xin Zhou, Shaochun Li, Kanghua Wang. service 2015: 113-116 [doi]
- Second Order-Based Real-Time Anomaly Detection for Application Maintenance ServicesQicheng Li, Lijun Mei, Shaochun Li, Liu Rong, Weiye Chen, Fenfei Wang. service 2015: 37-44 [doi]