Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of Reinforcement Learning Algorithms in Traffic Control of High Speed Networks., and . Advances in Computational Intelligence and Learning, page 353-369. Kluwer, (2002)Socially-Aware Networking: A Survey, , , , and . (2013)cite arxiv:1312.6552Comment: accepted. IEEE Systems Journal, 2013.Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health., , , and . IEEE Trans. Cloud Comput., 11 (3): 2839-2855 (July 2023)Cloud robotics: Current status and open issues., , , , , and . IEEE Access, (2016)P2P soft security: On evolutionary dynamics of P2P incentive mechanism., , , and . Comput. Commun., 34 (3): 241-249 (2011)A real-time dynamic key management for hierarchical wireless multimedia sensor network., , , , , and . Multim. Tools Appl., 67 (1): 97-117 (2013)Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data., , and . IEEE Trans. Serv. Comput., 9 (1): 33-45 (2016)Stackelberg Game Based Power Control with Outage Probability Constraints for Cognitive Radio Networks., , and . Int. J. Distributed Sens. Networks, (2015)A roadmap of fuzzy logic in ATM, mobile and active networks: challenges of the new century.. Soft Comput., 7 (4): 263-277 (2003)Jamming in underwater sensor networks: detection and mitigation., , , , and . IET Commun., 6 (14): 2178-2188 (2012)