Author of the publication

Second-Order Rate-Control Based Transport Protocols Over Mobile Wireless Networks.

, , and . WCNC, page 3719-3724. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Execution of A Requirement Model in Software Development., , , , and . IASSE, page 203-208. ISCA, (2004)Social interaction increases capacity of wireless networks., , and . IWCMC, page 467-472. IEEE, (2013)Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler., , , and . IEEE Internet of Things Journal, 1 (3): 276-288 (2014)Multi-layer security scheme for implantable medical devices., , , , , , and . Neural Comput. Appl., 32 (9): 4347-4360 (2020)Cross-Modal Object Detection Via UAV., , , , , , and . IEEE Trans. Veh. Technol., 72 (8): 10894-10905 (August 2023)A Node Location Algorithm Based on Node Movement Prediction in Underwater Acoustic Sensor Networks., , , , , and . IEEE Trans. Veh. Technol., 69 (3): 3166-3178 (2020)A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain., , , , and . GLOBECOM, page 1-6. IEEE, (2020)Mitigating Security Risks in 6G Networks-Based Optimization of Deep Learning., , , and . GLOBECOM, page 7249-7254. IEEE, (2023)A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering., , , , and . GLOBECOM, page 5889-5894. IEEE, (2023)