Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power and rate assignment policies for best-effort services in WCDMA., , and . PIMRC, page 1601-1605. IEEE, (2002)Handling of Uplink Transmitted Carrier Power Difference in DC-HSUPA., , , and . VTC Spring, page 1-5. IEEE, (2011)Scheduling algorithms for HS-DSCH in a WCDMA mixed traffic scenario., and . PIMRC, page 1485-1489. IEEE, (2003)Radio resource management in a mobile multimedia network with distributed coverage., , , and . PIMRC, page 1335-1339. IEEE, (2000)Scheduling algorithms for soft handoff in cellular packet CDMA., , , and . PIMRC, page 671-675. IEEE, (2000)SQL injection detection and exploitation framework for penetration testing.. London Metropolitan University, UK, (2019)British Library, EThOS.A Novel Algorithm for Fast and Efficient Speed-Sensorless Maximum Power Point Tracking in Wind Energy Conversion Systems., , , and . IEEE Trans. Ind. Electron., 58 (1): 29-36 (2011)Short-Term Load Forecasting using Bi-directional Sequential Models and Feature Engineering for Small Datasets., , , , and . CoRR, (2020)PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks., , , , , and . Comput. Commun., (2022)A Novel TCP/IP Header Hijacking Attack on SDN., , , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2022)