From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CCH-MAC: Evading hidden terminal in ad-hoc network., , , , и . ICTC, стр. 261-266. IEEE, (2014)A Genetic Approach for Joint Link Scheduling and Power Control in SIC-enable Wireless Networks., , , и . KSII Trans. Internet Inf. Syst., 10 (4): 1679-1691 (2016)On Minimizing Interference-Free Broadcast Latency in Duty-Cycled Wireless Sensor Networks., , , , , , и . Ad Hoc Sens. Wirel. Networks, 18 (3-4): 293-309 (2013)Scheduling under SINR Model in Ad Hoc Networks with Successive Interference Cancellation., , и . GLOBECOM, стр. 1-5. IEEE, (2010)Jamming attack in WSN: a spatial perspective., , и . UbiComp, стр. 563-564. ACM, (2011)Trace-Based Runtime Instruction Rescheduling for Architecture Extension., , , и . ICESS, том 3820 из Lecture Notes in Computer Science, стр. 4-15. Springer, (2005)Context-Aware Scheduling in Wireless Networks with Successive Interference Cancellation., , , и . ICC, стр. 1-5. IEEE, (2011)Neighbor-Aware Optimizing Routing for Wireless Ad Hoc Networks., , и . UIC, том 4611 из Lecture Notes in Computer Science, стр. 340-349. Springer, (2007)A High-throughput MAC Protocol for Wireless Ad Hoc Networks., , , и . PerCom Workshops, стр. 405-409. IEEE Computer Society, (2006)Applying active measurement in the rate adaptation for 802.11 wireless networks., , и . WICON, стр. 22. ICST, (2008)