Author of the publication

Cognitive security management with reputation based cooperation schemes in heterogeneous networks.

, , , , , , and . CICS, page 19-23. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous Network Management Using Cooperative Learning for Network-Wide Load Balancing in Heterogeneous Networks., , , , , and . GLOBECOM, page 2547-2551. IEEE, (2008)Use of adaptive integer-to-integer wavelet transforms in lossless image coding., and . ISCAS (2), page 393-396. IEEE, (2001)An analysis on the effect of image features on lossy coding performance., and . IEEE Signal Process. Lett., 7 (5): 104-107 (2000)Self-adapting protocol tuning for multi-hop wireless networks using Q-learning., , , , and . Int. J. Netw. Manag., 23 (2): 119-136 (2013)An analysis on the effect of image activity on lossy coding performance., and . ISCAS, page 295-298. IEEE, (2000)Analysis-based adaptive wavelet filter selection in lossy image coding schemes., and . ISCAS, page 29-32. IEEE, (2000)Cognitive security management with reputation based cooperation schemes in heterogeneous networks., , , , , , and . CICS, page 19-23. IEEE, (2009)Homomorphisms on the Monoid of Fuzzy Implications $(I, \circledast)$ - A Complete Characterization., and . PReMI, volume 8251 of Lecture Notes in Computer Science, page 563-568. Springer, (2013)Software Agents for Computer Games., and . GAME-ON, page 56-. ?, (2000)Improved Approaches for Cost-Effective Traffic Grooming in WDM Ring Networks: Non-Uniform Traffic and Bidirectional Ring., , , and . ICC (3), page 1295-1299. IEEE, (2000)