Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overhead Control With Reliable Transmission of Popular Packets in Ad-Hoc Social Networks., , , , and . IEEE Trans. Vehicular Technology, 65 (9): 7647-7661 (2016)Generic model control for hybrid energy storage system in electric vehicles., , , and . IECON, page 7151-7156. IEEE, (2017)TWOACK: preventing selfishness in mobile ad hoc networks., , and . WCNC, page 2137-2142. IEEE, (2005)Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach., , , and . Allerton, page 378-384. IEEE, (2016)Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints., , , and . GLOBECOM, page 1-6. IEEE, (2015)Efficient Link Cuts in Online Social Networks., , , and . GLOBECOM, page 1-6. IEEE, (2015)Asymptotic converse bound for secret key capacity in hidden Markov model., , , , and . ISIT, page 1968-1972. IEEE, (2017)The Propagation of Counteracting Information in Online Social Networks: A Case Study., , , and . ICDM Workshops, page 1173-1177. IEEE, (2018)The step length able-bodied human tend to choose during stable straight forward level walking., , , , , and . ICARM, page 868-874. IEEE, (2019)Secure Routing Based on Social Similarity in Opportunistic Networks., , , , and . IEEE Trans. Wirel. Commun., 15 (1): 594-605 (2016)