Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Confident Community to Secure Mobile Ad Hoc Networks., , , and . ICC, page 1254-1259. IEEE, (2007)Randomized energy aware routing algorithms in mobile ad hoc networks., , and . MSWiM, page 71-78. ACM, (2005)Low-Latency Polling Schemes for Long-Reach Passive Optical Networks., , , , , and . IEEE Trans. Commun., 61 (7): 2936-2945 (2013)A NOMA Scheme Exploiting Partial Similarity Among Users Bit Sequences., , and . IEEE Trans. Commun., 66 (10): 4923-4935 (2018)Special issue on security in mobile wireless networks., , , and . Secur. Commun. Networks, 3 (2-3): 99-101 (2010)Delay-Aware Multi-Source Multicast Resource optimization in NFV-Enabled Network., , and . ICC, page 1-7. IEEE, (2020)A Two-Stage Protection Method for Detection and Mitigation of Coordinated EVSE Switching Attacks., , , and . IEEE Trans. Smart Grid, 12 (5): 4377-4388 (2021)Macro-Cell Assisted Task Offloading in MEC-Based Heterogeneous Networks With Wireless Backhaul., , , and . IEEE Trans. Network and Service Management, 16 (4): 1754-1767 (2019)Traffic engineering in cloud data centers: A column generation approach., , , and . NOMS, page 1-5. IEEE, (2014)Network function virtualization scheduling with transmission delay optimization., , and . NOMS, page 638-644. IEEE, (2016)