Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly-based intrusion detection system for ad hoc networks., , and . NOF, page 1-3. IEEE, (2016)Preference and Mobility-Aware Task Assignment in Participatory Sensing., , and . MSWiM, page 93-101. ACM, (2016)A performance study of TCP variants in terms of energy consumption and average goodput within a static ad hoc environment., , and . IWCMC, page 503-508. ACM, (2006)Predictive resource allocation in cellular networks using Kalman filters., , and . ICC, page 974-981. IEEE, (2003)Managing the decision-making process for opportunistic mobile data offloading., , , and . NOMS, page 1-8. IEEE, (2014)Hierarchical Fair Spectrum Sharing in CRSNs for Smart Grid Monitoring., , , and . VTC Spring, page 1-7. IEEE, (2018)QEMSS: A selection scheme for participatory sensing tasks., and . CFIP/NOTERE, page 1-6. IEEE, (2015)Distributed load balancing by two-hop relaying in LTE-Advanced networks., and . SECON, page 337-345. IEEE, (2014)Simulcast-based DCA scheme for unicast and multicast communications in LEO satellite networks., , and . WCNC, page 1472-1476. IEEE, (2000)Prototyping telematic services in a wireless vehicular mesh network environment., , , and . WCNC Workshops, page 371-376. IEEE, (2012)