Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Construction of Dominating Set in Wireless Networks, and . CoRR, (2012)Link scheduling for throughput maximization in multihop wireless networks under physical interference., , , , and . Wireless Networks, 23 (8): 2415-2430 (2017)Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering., , , , and . IPCCC, page 1-8. IEEE, (2020)Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective., , , , , and . IWQoS, page 1-11. IEEE, (2022)Secure and Anonymous Communications Over Delay Tolerant Networks., , , and . IEEE Access, (2020)Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach., , , , , and . ICNC, page 107-111. IEEE, (2020)GARD: Gender difference analysis and recognition based on machine learning., , , , , and . Array, (2022)Supervised local spline embedding for medical diagnosis., , , , and . Multim. Tools Appl., 79 (21-22): 15025-15042 (2020)Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks., , , and . IEEE/ACM Trans. Netw., 20 (3): 690-698 (2012)Energy-efficient scheduling with delay constraints for wireless sensor networks: A calculus-based perspective., , , , and . Comput. Commun., 35 (16): 1983-1993 (2012)