From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Estimating Graph Robustness Through the Randic Index., , , , и . IEEE Trans. Cybern., 48 (11): 3232-3242 (2018)Provably secure three-party authenticated key agreement protocol using smart cards., , , , , и . Comput. Networks, (2014)A general effective rate control system based on matching measurement and inter-quantizer., , , , и . Inf. Sci., (2016)Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection., , , , и . IEEE Commun. Mag., 53 (5): 128-137 (2015)A Social-Aware Virtual MAC Protocol for Energy-Efficient D2D Communications Underlying Heterogeneous Cellular Networks., , , и . IEEE Trans. Veh. Technol., 67 (9): 8372-8385 (2018)Selective sensing and transmission for multi-channel cognitive radio networks., , , , и . EURASIP J. Wirel. Commun. Netw., (2011)Alternative relaying for cooperative multiple-access channels in wireless vehicular networks., , , , и . EURASIP J. Wirel. Commun. Netw., (2014)Process drama in the virtual world - a survey., , и . Int. J. Arts Technol., 1 (1): 13-33 (2008)Aggregated bandwidth allocation: investigation of performance of classical constrained and genetic algorithm based optimisation techniques., , , , и . Comput. Commun., 25 (16): 1443-1453 (2002)A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps., , , и . Appl. Math. Comput., (2017)