Author of the publication

On delay constrained CAC scheme and scheduling policy for CBR traffic in IEEE 802.11e wireless LANs.

, , , and . Wirel. Commun. Mob. Comput., 10 (11): 1509-1520 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A low cost transparent traversal method for NAT., , and . IWCMC, page 671-676. IEEE, (2011)Mobile cloud computing service based on heterogeneous wireless and mobile P2P networks., , , and . IWCMC, page 661-665. IEEE, (2011)A Collision Alleviation Scheme for IEEE 802.11p VANETs., , , and . Wireless Personal Communications, 56 (3): 371-383 (2011)An efficient route scheduling mechanism for WiMAX network - ERRATUM., , , and . Knowledge Eng. Review, 31 (2): 205 (2016)Contention Window Size Adjustment in Unsaturated IEEE 802.11 WLANs., and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-10. Springer, (2017)A genetic algorithm approach for detecting hierarchical and overlapping community structure in dynamic social networks., , and . WCNC, page 4469-4474. IEEE, (2013)An RFID secure authentication mechanism in WLAN., , , and . Comput. Commun., 34 (3): 236-240 (2011)Wireless Big Data Computing in Smart Grid., , , , , , and . IEEE Wirel. Commun., 24 (2): 58-64 (2017)A novel parallel algorithm for frequent pattern mining with privacy preserved in cloud computing environments., and . Int. J. Ad Hoc Ubiquitous Comput., 6 (4): 205-215 (2010)PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks.. J. Netw. Comput. Appl., 34 (5): 1468-1473 (2011)