Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)MobiCacher: Mobility-aware content caching in small-cell networks., , , , and . GLOBECOM, page 4537-4542. IEEE, (2014)What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks., , , and . IEEE Trans. Vehicular Technology, 68 (1): 1041-1044 (2019)Coordinated power conservation for ad hoc networks., and . ICC, page 3330-3335. IEEE, (2002)Deploying Directional Sensor Networks with Guaranteed Connectivity and Coverage., , , and . SECON, page 153-160. IEEE, (2008)CONI: Credit-Based Overlay and Interweave Dynamic Spectrum Access Protocol for Multi-Hop Cognitive Radio Networks., , and . GLOBECOM, page 1-6. IEEE, (2011)Adaptive topology control for heterogeneous mobile ad hoc networks using power estimation., , and . WCNC, page 392-399. IEEE, (2006)Swarm Interpolation Using an Approximate Chebyshev Distribution., , , , and . ANTS, volume 7461 of Lecture Notes in Computer Science, page 324-331. Springer, (2012)Work-in-Progress-Design and Evaluation of Mixed Reality Programs for Cybersecurity Education., , , and . iLRN, page 1-3. IEEE, (2021)