Author of the publication

Using statistical data for reliable mobile communications.

, , , and . Wirel. Commun. Mob. Comput., 2 (1): 101-111 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed QoS Routing for Backbone Overlay Networks., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1014-1025. Springer, (2006)Accurate Local Estimation of Geo-Coordinates for Social Media Posts., , and . SEKE, page 642-647. Knowledge Systems Institute Graduate School, (2014)Industry-wise Analysis of Security Breaches in Data Loss Incidents., , and . SEKE, page 615-619. Knowledge Systems Institute Graduate School, (2014)Performability Analysis of a Pipeline Software Architecture., and . COMPSAC (1), page 77-82. IEEE Computer Society, (2005)A Model-driven Approach for Price/Performance Tradeoffs in Cloud-based MapReduce Application Deployment., , , , , and . MDHPCL@MoDELS, volume 1118 of CEUR Workshop Proceedings, page 37-42. CEUR-WS.org, (2013)Software defect repair times: a multiplicative model., and . PROMISE@ICSE, page 93-100. ACM, (2008)Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC., , , , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 293-300. Springer, (2011)How Social Network APIs Have Ended the Age of Privacy., , and . SEKE, page 400-405. Knowledge Systems Institute Graduate School, (2012)Evaluating Open Source Reverse Engineering Tools for Teaching Software Engineering., , and . SEKE, page 162-167. Knowledge Systems Institute Graduate School, (2012)Multi-level Anomaly Detection with Application-Level Data., and . SEKE, page 718-. Knowledge Systems Institute Graduate School, (2007)