Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signalprint-Based Intrusion Detection in Wireless Networks., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2009)Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks., , , and . Wireless Personal Communications, 53 (1): 111-131 (2010)Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks., and . Inf. Process. Lett., 109 (15): 868-875 (2009)Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks., , , and . IEEE Trans. Software Eng., 30 (4): 218-230 (2004)The Reliability of Embedded AI Systems., and . IEEE Expert, 8 (2): 72-78 (1993)Trust-Based Decision Making for Health IoT Systems., and . IEEE Internet of Things Journal, 4 (5): 1408-1419 (2017)A survey of intrusion detection in wireless network applications., and . Comput. Commun., (2014)Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers., and . Perform. Evaluation, 33 (2): 89-112 (1998)Performance evaluation of an admission control algorithm: dynamic threshold with negotiation., , and . Perform. Evaluation, 52 (1): 1-13 (2003)A Model for the Stability Analysis of Maintenance Stragies for Linear List., , and . Comput. J., 34 (1): 80-87 (1991)