Author of the publication

Turbo Codes for 10-66GHz WiMax Systems

, and . International Journal of Infrared and Millimeter Waves, 26 (8): 1127-1139 (August 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Learning-Based Framework for Constrained Shortest Path Problems., and . SMC, page 62-68. IEEE, (2023)Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations., and . CNML, page 88-92. ACM, (2023)Turbo Codes for 10-66GHz WiMax Systems, and . International Journal of Infrared and Millimeter Waves, 26 (8): 1127-1139 (August 2005)Detecting Network-Wide Traffic Anomalies Based on Spatial HMM., , and . NPC Workshops, page 198-203. IEEE Computer Society, (2008)Network Traffic Content Identification Based on Time-Scale Signal Modeling., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2607-2624 (May 2023)Internet traffic clustering with constraints., , , and . IWCMC, page 619-624. IEEE, (2012)A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism., and . NPC Workshops, page 88-95. IEEE Computer Society, (2008)Assessment of Network Security Policy Based on Security Capability., and . CSSE (3), page 906-910. IEEE Computer Society, (2008)978-0-7695-3336-0.A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm., and . CIS, page 36-40. IEEE Computer Society, (2013)Internet Traffic Classification Using Machine Learning: A Token-based Approach., , and . CSE, page 285-289. IEEE Computer Society, (2011)