Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of the capacity of wireless networks by optimizing communication distance., , and . MWCN, page 11-15. IEEE, (2007)Capacitated Refuge Assignment for Speedy and Reliable Evacuation., , , and . ISPRS Int. J. Geo Inf., 9 (7): 442 (2020)Automatic Evacuation Guiding Scheme Using Trajectories of Mobile Nodes., , , and . MobiWIS, volume 9228 of Lecture Notes in Computer Science, page 3-14. Springer, (2015)Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem., and . J. Netw. Syst. Manag., 31 (1): 24 (2023)Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack., , , and . IEEE ICBC, page 1-4. IEEE, (2021)Integer Programming Formulation for Grouping Clusters in Ferry-assisted DTNs., , and . AINA Workshops, page 1125-1130. IEEE Computer Society, (2012)Dealing with Imbalanced Classes in Bot-IoT Dataset., , , , and . CoRR, (2024)Mobile P2P Networks for Highly Dynamic Environments., , and . PerCom, page 453-457. IEEE Computer Society, (2008)IOTA-Based Access Control Framework for the Internet of Things., , , and . BRAINS, page 87-91. IEEE, (2020)Mining Pool Selection Problem in the Presence of Block Withholding Attack., , , and . Blockchain, page 321-326. IEEE, (2020)