From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks., , , , , и . Wirel. Commun. Mob. Comput., (2017)Opportunistic source scheduling in multi-source two-way relay networks., , , и . Wirel. Commun. Mob. Comput., 16 (4): 459-468 (2016)Forecasting methodology and traffic estimation for satellite multimedia services., , , , и . ICC, стр. 1084-1088. IEEE, (1999)Software Defined Wireless Networks: Part 2 Guest Editorial., , , , и . IEEE Communications Magazine, 54 (1): 10-11 (2016)Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications., , , , и . IEEE Trans. Vehicular Technology, 63 (5): 2093-2103 (2014)Code Book Based CL-MIMO for DL Wimax Rel. 1.5: System Level Performance Analysis., , , и . ICC, стр. 1-5. IEEE, (2009)Security Requirements and Standards for 4G and 5G Wireless Systems., , и . GetMobile Mob. Comput. Commun., 22 (1): 15-20 (2018)Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks., , , и . IEEE Trans. Veh. Technol., 65 (1): 367-380 (2016)Joint Computation Offloading and Radio Resource Allocation in MEC-Based Wireless-Powered Backscatter Communication Networks., , , , и . IEEE Trans. Veh. Technol., 70 (6): 6200-6205 (2021)A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study., , , , , и . IEEE Trans. Veh. Technol., 58 (1): 398-408 (2009)