Author of the publication

Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss.

, , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 821-833. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city., , , and . Veh. Commun., (2019)Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks., and . IEEE Trans. Mob. Comput., 14 (11): 2229-2243 (2015)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 129-142. Springer, (2010)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 166-178. Springer, (2018)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization., , and . ICC, page 5451-5456. IEEE, (2012)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)