Author of the publication

Application of Chaos Theory to the Modeling of Compressed Video.

, and . ICC (2), page 836-840. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandwidth allocation in wireless networks with guaranteed packet-loss performance., and . IEEE/ACM Trans. Netw., 8 (3): 337-349 (2000)Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks., , and . CoRR, (2017)Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks., , and . CoRR, (2016)On the Chaotic Behavior of Variable-Bit-Rate Video and Its Application in Traffic Modeling., and . Comput. Sci. J. Moldova, 12 (2): 171-196 (2004)Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems., and . IEEE Trans. Wirel. Commun., 16 (6): 3775-3786 (2017)Power Games for Secure Communications in Single-Stream MIMO Interference Networks., , and . IEEE Trans. Wirel. Commun., 17 (9): 5759-5773 (2018)Application of Chaos Theory to the Modeling of Compressed Video., and . ICC (2), page 836-840. IEEE, (2000)Cognitive Networks With In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures., , and . IEEE Trans. Cogn. Commun. Netw., 6 (1): 296-309 (2020)Transmission power control in wireless ad hoc networks: challenges, solutions and open issues., , and . IEEE Netw., 18 (5): 8-14 (2004)Performance evaluation of constraint-based path selection algorithms., , , and . IEEE Netw., 18 (5): 16-23 (2004)