Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions., , and . Int. J. Netw. Secur., 20 (4): 655-663 (2018)Modeling and performance evaluation of jamming-tolerant wireless systems., and . J. Ambient Intell. Humaniz. Comput., 10 (11): 4361-4375 (2019)Routing in user-centric networks., , , , , and . IEEE Commun. Mag., 52 (9): 44-51 (2014)Boundary-Aware Network With Two-Stage Partial Decoders for Salient Object Detection in Remote Sensing Images., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)Routing, spectrum access, and scheduling in multi-hop multi-channel wireless networks with MIMO links., , , , and . EURASIP J. Wirel. Commun. Netw., (2015)Optimizing Job Reliability Through Contention-Free, Distributed Checkpoint Scheduling., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 2077-2088 (2021)Mahler Measure of Families of Polynomials Defining Genus 2 and 3 Curves., and . Exp. Math., 32 (2): 321-336 (April 2023)Cooperative spectrum sharing of multiple primary users and multiple secondary users., , , , and . Digit. Commun. Networks, 2 (4): 191-195 (2016)A comparative study of name resolution and routing mechanisms in information-centric networks., , , and . Digit. Commun. Networks, 5 (2): 69-75 (2019)Rough Set Model for Constraint-based Multi-dimensional Association Rule Mining., , , and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 99-105. IOS Press, (2006)