Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of a scalable media access control protocol for single hop WDM networks., , , , , and . IJHPCN, 3 (5/6): 309-319 (2005)Implementation of new functions for improving learners motivation in a web-based e-learning system., , , , and . iiWAS, page 359-366. ACM, (2008)A P2P system based on JXTA-overlay and its application for end-device control., , , , , and . MoMM, page 364-369. ACM, (2008)Analysis of ad-hoc networks connectivity considering shadowing radio model., , , , , and . MoMM, page 464-468. ACM, (2009)M3PS: A JXTA-based Multi-platform P2P System and its Web Application Tools., , , and . IJWIS, 2 (3/4): 187-196 (2006)Economically Viable Support for Internet Mobility., , and . ICC, page 1-6. IEEE, (2011)A web-based e-learning system for increasing study efficiency by stimulating learner's motivation., , , and . Inf. Syst. Frontiers, 8 (4): 297-306 (2006)Priority Based Wireless Communications for Health Monitoring on Highways., , and . J. Interconnect. Networks, 9 (4): 337-349 (2008)Performance Evaluation of Reactive and Proactive Protocols for Ad-Hoc Sensor Networks Using Different Radio Models., , , , and . J. Interconnect. Networks, 8 (4): 387-405 (2007)Requirements for Trustworthy Artificial Intelligence - A Review., , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 105-115. Springer, (2020)