Author of the publication

Guest Editorial: Special Issue on Cognitive Radio Oriented Wireless Networks and Communications.

, , , , , and . Mob. Networks Appl., 13 (5): 411-415 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks., , , and . J. Cyber Secur. Mobil., (2012)On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 590-594. SPIE, (2005)Computation and transmission energy modeling through profiling for MPEG4 video transmission., , , and . ICME, page 281-284. IEEE Computer Society, (2003)Adaptive steganography., , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 69-78. SPIE, (2002)Blind source separation for steganalytic secret message estimation., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650507. SPIE, (2007)A Bayesian image steganalysis approach to estimate the embedded secret message., and . MM&Sec, page 33-38. ACM, (2005)Preface to Special Session on Recent Advances in Wireless Communication.. ITCC, page 153. IEEE Computer Society, (2001)Impact of Constraints on the Complexity of Dynamic Spectrum Assignment., , , and . GLOBECOM, page 3164-3169. IEEE, (2008)Steganalysis of GIM-based data hiding using kernel density estimation., , and . MM&Sec, page 149-160. ACM, (2007)Stochastic learning solution for distributed discrete power control game in wireless data networks., and . IEEE/ACM Trans. Netw., 16 (4): 932-944 (2008)