Author of the publication

Further analysis and tuning of registered multi-cycle polling in wireless medium access management.

, and . HP-MOSys, page 53-60. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Exception Handling Scheme for Out Patient Workflow in a Wireless Handheld Hospital Environment., , and . ISWS, page 169-175. CSREA Press, (2005)Health Data in Cloud Environments., and . PACIS, page 96. (2015)Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol., and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 100-114. Springer, (2010)Connectivity abstractions and "service-oriented network" architecture., and . ICNC, page 337-342. IEEE Computer Society, (2012)End-to-End Security Methods for UDT Data Transmissions., and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 383-393. Springer, (2010)Realization of congestion-aware energy-aware virtual link embedding., , and . ITNAC, page 1-6. IEEE, (2019)WFICC: A new mechanism for provision of QoS and Congestion Control in WiMAX., and . CCNC, page 552-558. IEEE, (2013)Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 183-194. Springer, (2011)The design of a secure, extensible, and deployable-programmable network platform., , and . ICON, page 63-68. IEEE, (2003)An assistive healthcare platform for both social and service networking for engaging elderly people., and . APCC, page 1-6. IEEE, (2017)