Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Efficient Infinity-Shaped Large Angular- and Polarization-Independent Metamaterial Absorber., , , , , and . Symmetry, 15 (2): 352 (February 2023)What Is Behind the Tipping Point Mechanism?, , and . AMCIS, Association for Information Systems, (2011)Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks., , , and . WCNC, page 1877-1882. IEEE, (2007)Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks., and . GLOBECOM, IEEE, (2006)Next Generation Networks Architecture and Layered End-to-End QoS Control., , , and . ISPA, volume 3758 of Lecture Notes in Computer Science, page 1055-1064. Springer, (2005)Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 437-445. Springer, (2015)Human Assisted Positioning Using Textual Signs., , and . HotMobile, page 87-92. ACM, (2015)Kinematic Characteristics Analysis of a Double-Ring Truss Deployable Antenna Mechanism., , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 247-259. Springer, (2019)Data Mining Support for the Improvement of MODIS Aerosol Retrievals., , , and . IGARSS, page 2453-2456. IEEE, (2006)A Vulnerability Attack Graph Generation Method Based on Scripts., , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)