Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESco: Eligibility score-based strategy for sensors selection in CR-IoT: Application to LoRaWAN., , , , , and . Internet Things, (2021)Analytical and Simulation study for LoRa Modulation., , , , , and . ICT, page 655-659. IEEE, (2018)Mojette transform based LDPC erasure correction codes for distributed storage systems., , and . SIU, page 1-4. IEEE, (2017)Region-of-Interest intra prediction for H.264/AVC error resilience., , , and . ICIP, page 3109-3112. IEEE, (2009)Decision tree-based blending method using deep-learning for network management., , and . NOMS, page 1-7. IEEE, (2022)Finite Radon coding for content delivery over hybrid client-server and P2P architecture., , , , and . ISCCSP, page 1-4. IEEE, (2012)Video content transmission in a public safety system model based on flying Ad-hoc networks., , , , and . AQTR, page 1-4. IEEE, (2018)New Results on Q-Routing Protocol for Wireless Networks., , and . ADHOCNETS, volume 345 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 29-43. Springer, (2020)Mutida: A Rights Management Protocol for Distributed Storage Systems Without Fully Trusted Nodes., , , , and . Trans. Large Scale Data Knowl. Centered Syst., (2022)Performance evaluation of feature selection and tree-based algorithms for traffic classification., , and . ICC Workshops, page 1-6. IEEE, (2021)