From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wireless sensor networks for intrusion detection: packet traffic modeling., , , и . IEEE Communications Letters, 10 (1): 22-24 (2006)Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks., , , и . ISCIS, том 3280 из Lecture Notes in Computer Science, стр. 363-372. Springer, (2004)On the retrial and redial phenomena in GSM networks., , , и . WCNC, стр. 885-889. IEEE, (2000)WCOT: A Realistic Lifetime Metric for the Performance Evaluation of Wireless Sensor Networks., и . PIMRC, стр. 1-5. IEEE, (2007)RFID based indoor location determination for elderly tracking., и . SIU, стр. 1-4. IEEE, (2012)Long Short-Term Network Based Unobtrusive Perceived Workload Monitoring with Consumer Grade Smartwatches in the Wild., , и . CoRR, (2019)Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours., , , и . Comput. Networks, 54 (3): 428-441 (2010)Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks., , и . Comput. Commun., 34 (16): 1991-2001 (2011)How Laboratory Experiments Can Be Exploited for Monitoring Stress in the Wild: A Bridge Between Laboratory and Daily Life., , , , , и . Sensors, 20 (3): 838 (2020)Exploring the effects of monitoring and flow-rule timeout durations on load balancing in software defined networks., , и . SIU, стр. 1493-1496. IEEE, (2015)