Author of the publication

Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs.

, , , , and . ACTEA, page 178-183. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Based Key Distribution Framework for Link Layer Security of AMI Networks., , , and . IEEE Trans. Smart Grid, 9 (4): 3166-3179 (2018)EmuNET: a real-time network emulator., and . SAC, page 357-362. ACM, (2004)Automated device for determination of skin lesion regions., , , and . SAC, page 859-860. ACM, (2009)A design methodology for energy aware neural networks., , , , , and . IWCMC, page 1333-1340. IEEE, (2011)An enterprise policy-based security protocol for protecting relational database network objects., , and . IWCMC, page 343-348. ACM, (2006)A resource reservation attack against LTE networks., , , and . ICCIT, page 262-268. IEEE, (2013)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs., , , , and . ACTEA, page 178-183. IEEE, (2016)Virtualized network views for localizing misbehaving sources in SDN data planes., , , and . ICC, page 1-7. IEEE, (2017)Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , and . SecureComm, page 240-242. IEEE, (2005)