Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)A cross-layer approach to resource discovery and distribution in mobile ad hoc networks., , and . Mobility Conference, page 54. ACM, (2006)Coordinated power conservation for ad hoc networks., and . ICC, page 3330-3335. IEEE, (2002)Deploying Directional Sensor Networks with Guaranteed Connectivity and Coverage., , , and . SECON, page 153-160. IEEE, (2008)CONI: Credit-Based Overlay and Interweave Dynamic Spectrum Access Protocol for Multi-Hop Cognitive Radio Networks., , and . GLOBECOM, page 1-6. IEEE, (2011)Adaptive topology control for heterogeneous mobile ad hoc networks using power estimation., , and . WCNC, page 392-399. IEEE, (2006)Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks., and . Ad Hoc Networks, 5 (2): 210-227 (2007)Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks., , , and . MILCOM, page 1353-1358. IEEE, (2013)B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction., , , , and . CoRR, (2023)Swarm Interpolation Using an Approximate Chebyshev Distribution., , , , and . ANTS, volume 7461 of Lecture Notes in Computer Science, page 324-331. Springer, (2012)