From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Security Protocols for Mobile Healthcare., , , и . J. Medical Systems, 40 (11): 229:1-229:10 (2016)Analysis of Students' Learning Emotions Using EEG., , , и . ICITL, том 11937 из Lecture Notes in Computer Science, стр. 498-504. Springer, (2019)Mobility protocols for ITS/VANET., и . Comput. Commun., 31 (12): 2765-2766 (2008)Design, implementation, and evaluation of the audio/video distribution transport protocol (AVDTP) for high quality audio support over Bluetooth., и . Comput. Commun., 28 (2): 215-223 (2005)End-to-end support over Heterogeneous Wired-Wireless Networks., , и . Comput. Commun., 31 (11): 2643-2645 (2008)Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity., , , и . IEEE Access, (2020)Ancillary Impacts of Multipath TCP on Current and Future Network Security., и . IEEE Internet Comput., 19 (5): 58-65 (2015)Mobile cloud computing: Challenges and future research directions., , , и . J. Netw. Comput. Appl., (2018)Wireless energy harvesting: Empirical results and practical considerations for Internet of Things., , , и . J. Netw. Comput. Appl., (2018)Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks., , и . Concurr. Comput. Pract. Exp., 25 (1): 58-84 (2013)