From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks., и . CIT, том 3356 из Lecture Notes in Computer Science, стр. 160-168. Springer, (2004)Advanced mobile agent security models for code integrity and malicious availability check., , , , и . J. Netw. Comput. Appl., 33 (6): 661-671 (2010)Dynamic resource management for downlink multimedia traffic in OFDMA cellular networks., , , , и . Kaleidoscope, стр. 1-7. IEEE, (2009)Performance analysis of mobile agent failure recovery in e-service applications., , и . Comput. Stand. Interfaces, 32 (1-2): 38-43 (2010)Detection and Recognition of File Masquerading for E-mail and Data Security., и . CNSA, том 89 из Communications in Computer and Information Science, стр. 253-262. Springer, (2010)Analysis of accounting models for the detection of duplicate requests in web services., , , , и . J. King Saud Univ. Comput. Inf. Sci., 25 (1): 7-24 (2013)Performance Evaluation of Energy Efficient On-demand Routing Algorithms for MANET., , и . ICIIS, стр. 1-5. IEEE, (2008)An intelligent technique to detect file formats and e-mail spam., и . A2CWiC, стр. 53:1-53:6. ACM, (2010)File Format Identification and Information Extraction., и . NaBIC, стр. 1497-1501. IEEE, (2009)Recovery model for free-roaming mobile agent against multiple attacks., и . MobiMedia, том 329 из ACM International Conference Proceeding Series, стр. 44. ICST, (2007)