Author of the publication

Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications.

, , , , , , , , , , and . INFOCOM, page 115-119. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Defense Methods of Cyber Attacks., , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)Human recognizer: an ECG based live biometric fingerprint., , , , , and . PAMCO@MobiHoc, page 21-27. ACM, (2016)A Review of APT Attack Detection Methods and Defense Strategies., , , and . DSC, page 67-70. IEEE, (2020)Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks., , , and . MobiCom, page 15-26. ACM, (2007)The Evaluation of Massage Skill of Palm Press Based on Dynamics and Kinematical Data., , , and . DASC, page 528-531. IEEE Computer Society, (2014)When smart grid meets PHEVs: a smart load distribution mechanism in smart grid., , , and . Personal and Ubiquitous Computing, 18 (8): 1917-1928 (2014)Real-Time Detection of Clone Attacks in Wireless Sensor Networks., , , and . ICDCS, page 3-10. IEEE Computer Society, (2008)A Clustering-Based Approach to Predict Outcome in Cancer Patients., , , and . ICMLA, page 541-546. IEEE Computer Society, (2007)Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks., , and . INFOCOM, page 73-81. IEEE, (2012)Dealing with Dynamic-Scale of Events: Matrix Recovery Based Compressive Data Gathering for Sensor Networks., , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 557-569. Springer, (2018)