From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Preserving k-Means Clustering in Multi-Party Environment., , и . SECRYPT, стр. 381-385. INSTICC Press, (2007)Study of multimedia variable bit rate video and voice sources over FDDI Networks., и . Broadband Islands, стр. 223-234. Elsevier, (1993)Energy Efficiency Framework for Time-limited Contention in the IEEE 802.11ah Standard., , и . GLOBECOM (Workshops), стр. 1-6. IEEE, (2021)Fast simulation of broadband telecommunications networks carrying long-range dependent bursty traffic., , и . WSC, стр. 374-381. WSC, (1999)QoS Mechanisms for IEEE 802.11 Wireless LANs., , и . HSNMC, том 3079 из Lecture Notes in Computer Science, стр. 609-623. Springer, (2004)Backward Link Authentication For RFID tags., , и . RFID-TA, стр. 348-352. IEEE, (2011)Smart wireless design scheme: fuzzy-logic routing and TDMA MAC protocol integration., , , , и . MOBIWAC, стр. 81-88. ACM, (2013)A Study of Intelligent Multimedia Services over PSTNs and the Internet., , и . Services and Visualization: Towards User-Friendly Design, том 1385 из Lecture Notes in Computer Science, стр. 250-264. Springer, (1998)Citizen security using machine learning algorithms through open data., , , , и . LATINCOM, стр. 1-6. IEEE, (2016)New contention resolution schemes for WiMAX., , , и . WCNC, стр. 1736-1741. IEEE, (2009)