From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

(N, 1) secret sharing approach based on steganography with gray digital images., , , и . WCNIS, стр. 325-329. IEEE, (2010)A Smart Backoff Scheme for Multicast Flows in Wireless LAN., , и . Smart Comput. Rev., 5 (3): 159-167 (2015)A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model., и . ICACT, стр. 53-57. IEEE, (2021)Impact of mobile sink for wireless sensor network., , и . ACM Southeast Regional Conference, стр. 338-339. ACM, (2011)Adaptive video streaming over HTTP., , и . ACM Southeast Regional Conference, стр. 26:1-26:3. ACM, (2014)Secure Scalable and Reliable Mobile Multicast with FI-Based Local Group Key., , , и . International Conference on Internet Computing, стр. 188-194. CSREA Press, (2008)Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern., , и . ICISC, том 8949 из Lecture Notes in Computer Science, стр. 317-327. Springer, (2014)An object discarding policy with FI systems for cooperative hybrid caching architecture., , , , и . ACM Southeast Regional Conference, стр. 411-416. ACM, (2008)A buffer management scheme for tree-based reliable multicast using infrequent acknowledgments., и . IPCCC, стр. 13-20. IEEE, (2004)A heuristic buffer management scheme for tree-based reliable multicast., и . ISCC, стр. 1123-1128. IEEE Computer Society, (2004)