From post

PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences.

, , и . ICHIT (2), том 310 из Communications in Computer and Information Science, стр. 46-52. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences., , и . ICHIT (2), том 310 из Communications in Computer and Information Science, стр. 46-52. Springer, (2012)Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment., , и . KES (3), том 4253 из Lecture Notes in Computer Science, стр. 1042-1049. Springer, (2006)Scheme for the Information Sharing Between IDSs Using JXTA., , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 754-761. Springer, (2005)A Study on the Improvement of Military Logistics System Using RFID., , , , и . ICIC (1), том 4113 из Lecture Notes in Computer Science, стр. 1098-1102. Springer, (2006)Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL., , и . KES (2), том 3682 из Lecture Notes in Computer Science, стр. 1056-1061. Springer, (2005)A Vulnerability Assessment Tool Based on OVAL in Linux System., , и . NPC, том 3222 из Lecture Notes in Computer Science, стр. 653-660. Springer, (2004)A Design of Safety Multimedia Packet Transmission DB System Management Scheme., , , и . ICHIT (1), том 7425 из Lecture Notes in Computer Science, стр. 591-597. Springer, (2012)A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems., , и . ICCSA (2), том 3981 из Lecture Notes in Computer Science, стр. 1060-1065. Springer, (2006)Implementation of Smart Car Using Fuzzy Rules., , , , , , , , , и 5 other автор(ы). ICHIT (2), том 206 из Communications in Computer and Information Science, стр. 609-616. Springer, (2011)Malicious Software Detection System in a Virtual Machine Using Database., , , и . ICHIT (2), том 206 из Communications in Computer and Information Science, стр. 212-218. Springer, (2011)