From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game theoretic modeling of security and trust relationship in cyberspace., , и . Int. J. Commun. Syst., 29 (9): 1500-1512 (2016)Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems., , , и . PDPTA, стр. 1229-1238. CSREA Press, (1997)A context-aware prefetching strategy for mobile computing environments., , , и . IWCMC, стр. 1109-1116. ACM, (2006)Mobile Agents to Automate Fault Management in Wireless and Mobile Networks., , и . IPDPS Workshops, том 1800 из Lecture Notes in Computer Science, стр. 1296-1300. Springer, (2000)Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches., , и . GLOBECOM, стр. 1-6. IEEE, (2009)Identification and Validation of Spatio-Temporal Associations in Wireless Sensor Networks, , и . Sensor Technologies and Applications, International Conference on, (2009)Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , и . WCNC, стр. 3341-3346. IEEE, (2007)Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks., , и . ICWN, стр. 203-212. CSREA Press, (2005)A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , и . Comput. Networks, 31 (1-2): 101-110 (1999)A modular methodology to verify communication protocols., и . Comput. Commun., 20 (12): 1069-1077 (1997)