Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Web Page Change Detection System Based on an Optimized Hungarian Algorithm., , , , and . IEEE Trans. Knowl. Data Eng., 19 (5): 599-613 (2007)Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification., and . ICCCN, page 1-9. IEEE, (2013)Enhancing cache invalidation in mobile environments., , and . Mobility Conference, page 1. ACM, (2008)On The Modeling and Analysis of Uplink and Downlink IEEE 802.11ax Wi-Fi With LTE in Unlicensed Spectrum., and . IEEE Trans. Wirel. Commun., 16 (9): 5779-5795 (2017)On the Impact of Multi-Channel Technology on Safety-Message Delivery in IEEE 802.11p/1609.4 Vehicular Networks., , , and . ICCCN, page 1-8. IEEE, (2012)Integrating Spectrum Database and Cooperative Sensing for Cognitive Vehicular Networks., , , and . VTC Fall, page 1-7. IEEE, (2013)Using Reflective Intelligent Surfaces for Indoor Scenarios: Channel Modeling and RIS Placement., and . WiMob, page 277-282. IEEE, (2021)FREDDY: A framework for VANET aided D2D discovery., , , and . WCNC, page 1-6. IEEE, (2016)CROWN: Discovering and consuming services in vehicular clouds., and . ICCIT, page 98-102. IEEE, (2013)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)