From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Price-based, budget-constrained user-level traffic management in multiple service networks., , и . GLOBECOM, стр. 2445-2449. IEEE, (2001)On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks., и . INFOCOM, стр. 96-100. IEEE, (2008)Rejuvenating Shadows: Fault Tolerance with Forward Recovery., , и . HPCC/SmartCity/DSS, стр. 547-554. IEEE Computer Society, (2017)A Network Level Framework for Synchronization Guarantees of Multimedia Streams., , и . Int. J. Comput. Their Appl., (2001)A Novel Approach Against Reactive Jamming Attacks., , , , и . Ad Hoc Sens. Wirel. Networks, 12 (1-2): 125-149 (2011)RECA: A Ring-Structured Energy-Efficient Cluster Architecture for Wireless Sensor Networks., и . MSN, том 3794 из Lecture Notes in Computer Science, стр. 927-936. Springer, (2005)Novel Techniques for Analysis and Design of Cross-Layer Optimized Wireless Sensor Networks., , , и . EURASIP J. Wireless Comm. and Networking, (2007)Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks., и . DCOSS, том 5516 из Lecture Notes in Computer Science, стр. 117-130. Springer, (2009)Privacy-preserving location and mobility management to support tether-free patients in ad-hoc networks., и . ICC, стр. 42-46. IEEE, (2012)Shadow Computing: An energy-aware fault tolerant computing model., , и . ICNC, стр. 73-77. IEEE, (2014)