Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contiki Cooja simulation for time bounded localization in wireless sensor network., , , , , and . SpringSim (CNS), page 1-7. SCS/ACM, (2015)Unified metric calculation of sampling-based turbo-coded noncoherent MFSK for mobile channel., , and . SpringSim (CNS), page 7. ACM, (2014)A Scalable MPLS Multicast Solution for Dense Mode Multicast Networks., , and . CAINE, page 234-237. ISCA, (2003)Analysis and test of electromigration failures in FPGAs., , , and . ISCAS, page 3905-3908. IEEE, (2010)Simulation of a DQDB MAC protocol with movable boundary and bandwidth balancing mechanisms., , and . Annual Simulation Symposium, page 118-128. IEEE Computer Society, (1992)A Study of Parallel Monitoring Algorithm in ATM Network Admission Control., , and . PDCS, page 295-301. ISCA, (2001)Security Modeling of Autonomous Systems: A Survey., , , and . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)Optimal Call Admission Control Policy for the RCS Schemes in Wireless Networks., , and . ICC, page 2845-2848. IEEE, (2008)Evaluating the Effectiveness of Java Static Analysis Tools., and . ESA, page 91-97. CSREA Press, (2007)Intelligent state space pruning for Monte Carlo simulation with applications in composite power system reliability., , , and . Eng. Appl. Artif. Intell., 26 (7): 1707-1724 (2013)