Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Hybrid Communication Policy using Network Coding Based Post-Quantum Cryptography and Fuzzy Inference System., , , and . ANTS, page 398-403. IEEE, (2022)On determining the fair bandwidth share for ABR connections in ATM networks., , , , and . ICC, page 1485-1491. IEEE, (1998)Multimedia Satellite Networks and TCP/IP Traffic Transport., , , and . IMSA, page 436-443. IASTED/ACTA Press, (1999)Providing Rate Guarantees to TCP over the ATM GFR Service., , , and . LCN, page 390-398. IEEE Computer Society, (1998)Design and Simulation of Asynchronous Transfer Mode-Available Bit Rate End System Congestion Control., , , and . Simul., 78 (3): 150-162 (2002)General weighted fairness and its support in explicit rate switch algorithms., , , , and . Comput. Commun., 23 (2): 149-161 (2000)Mind the tracker you wear: a security analysis of wearable health trackers., , and . SAC, page 131-136. ACM, (2016)Why Hackers Love eHealth Applications., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 58-63. (2016)Semantic Integration of Information Through Relation Mining - Application to Bio-medical Text Processing., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 365-372. Springer, (2007)SafeDroid: A Distributed Malware Detection Service for Android., , , and . SOCA, page 59-66. IEEE Computer Society, (2016)