Author of the publication

Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach.

, , and . J. Commun., 8 (4): 259-266 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the efficacy of molecularly targeted agents by using Kalman filter., , , and . GENSiPS, page 50-51. IEEE, (2011)Sensitivity analysis for drug effect study: An NF-κB pathway example., , , and . GlobalSIP, page 1418-1421. IEEE, (2014)Power control and proportional fair scheduling with minimum rate constraints in clustered multihop TD/CDMA wireless ad hoc networks., , , , and . WCNC, page 763-769. IEEE, (2006)Power Control for Cognitive Radio Ad Hoc Networks., , , and . LANMAN, page 7-12. IEEE, (2007)Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach., , and . J. Netw. Comput. Appl., 30 (1): 308-330 (2007)Auxiliary frequency and voltage regulation in microgrid via intelligent electric vehicle charging., , and . SmartGridComm, page 662-667. IEEE, (2014)Detection of spectrum congestion in cognitive radio ad hoc networks., , , and . IEEE ANTS, page 44-48. IEEE, (2012)Power control and scheduling with minimum rate constraints in clustered multihop TD/CDMA wireless ad hoc networks., , , and . Wirel. Commun. Mob. Comput., (2006)Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach., , and . J. Commun., 8 (4): 259-266 (2013)Context-driven pyramid registration network for estimating large topology-preserved deformation., , , , , , and . Neurocomputing, (2023)