Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably secure three-party authenticated key agreement protocol using smart cards., , , , , and . Comput. Networks, (2014)PNDOM: A domain function-based software component composition plan build approach., , , , and . SEDE, page 119-124. ISCA, (2007)Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment., , , , , and . FGCN (1), page 83-88. IEEE Computer Society, (2008)Packet Delivery Probability in Two-Hop Relay MANETs with Hybrid Routing., , , and . CANDAR, page 448-453. IEEE Computer Society, (2013)Hyperion: A Generic and Distributed Mobile Offloading Framework on OpenCL., , , , , , and . SenSys, page 607-621. ACM, (2022)SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 56-67. Springer, (2016)Network-Aware Data Transmission Scheduling for Saving Energy in Cellular Networks., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 514-521. IEEE, (2019)A novel component retrieval method based on weighted facet tree., , , , , and . J. Supercomput., 66 (3): 1167-1177 (2013)Poster: MULMOD - MULtiMODal Sustainable Mobility for Smart Cities in China and Germany., , , , , , and . EWSN, page 222-223. Junction Publishing, Canada / ACM, (2017)Energy-efficient packet transmission with unidirectional-valve scheduling., , , , and . IET Commun., 9 (9): 1248-1257 (2015)