Author of the publication

A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: Time-spectrum block utilization.

, , , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: Time-spectrum block utilization., , , , and . Future Gener. Comput. Syst., (2020)Traffic management based on token bucket mechanism for WiMAX networks., , and . Clust. Comput., 15 (4): 391-400 (2012)Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments., , , and . Internet Things, (April 2024)HeteRBar: Construction of Heterogeneous Reinforced Barrier in Wireless Sensor Networks., and . IEEE Communications Letters, 21 (8): 1859-1862 (2017)A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11., , , and . UNet, volume 10542 of Lecture Notes in Computer Science, page 38-47. Springer, (2017)An enhanced two level scheduler to increase multimedia services performance in LTE networks., , and . ICC, page 2351-2356. IEEE, (2014)Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks., , and . ICC, page 1808-1812. IEEE, (2014)On resilient event-driven partial barriers in mobile sensor networks., and . ICC, page 1-6. IEEE, (2016)Optimal distributed relay selection for duty-cycling Wireless Sensor Networks., , , and . GLOBECOM, page 145-150. IEEE, (2012)Packet dropping for real-time applications in wireless networks., , and . ICC, page 2949-2953. IEEE, (2013)