From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance comparison of LS, LMMSE and Adaptive Averaging Channel Estimation (AACE) for DVB-T2., , , , , , и . BMSB, стр. 1-5. IEEE, (2015)Adaptive Security for Low Data Rate Networks., и . Wirel. Pers. Commun., 29 (3-4): 323-350 (2004)The evolution of M2M into IoT., , и . BlackSeaCom, стр. 112-115. IEEE, (2013)Jamming attack: Behavioral modelling and analysis., , и . VITAE, стр. 1-5. IEEE, (2013)A Threat Analysis Methodology for Security Evaluation and Enhancement Planning., , и . SECURWARE, стр. 262-267. IEEE Computer Society, (2009)H-GCF: A Hybrid Green Conflict Free scheduling algorithm for mobile Wireless Sensor Networks., , , и . WPMC, стр. 1-5. IEEE, (2013)An alternative implementation of a cyclostationary detector., , , и . WPMC, стр. 45-49. IEEE, (2012)A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario., и . MobiQuitous, стр. 1-6. IEEE Computer Society, (2006)Cognitive radio network architecture: part II - trusted network layer structure., , , , и . ICUIMC, стр. 120-124. ACM, (2008)Hybrid mechanisms: Towards an efficient wireless sensor network medium access control., , , , и . WPMC, стр. 1-5. IEEE, (2011)