Author of the publication

Relay selection for AF wireless relay networks in adverse communication environments.

, , , , , , and . ACSSC, page 1821-1825. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relay selection for AF wireless relay networks in adverse communication environments., , , , , , and . ACSSC, page 1821-1825. IEEE, (2014)XML Access Control for Security and Memory Management., , and . INTELLCOMM, volume 190 of IFIP, page 179-189. Springer, (2005)Design of HDTS System for Locating Logical Errors in Java Programs., , and . ACIS-ICIS, page 418-423. IEEE Computer Society, (2005)Convergence P2P context awareness., , and . Peer-to-Peer Netw. Appl., 9 (3): 461-464 (2016)Access Control Mechanism for XML Document., and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 81-90. Springer, (2011)Data collection and analysis of smartphone use and sleep of secondary school children., , , , , and . BigComp, page 410-413. IEEE, (2017)An Efficient Authorization Mechanism for Secure XML Sources on the Web., and . J. Adv. Comput. Intell. Intell. Informatics, 10 (5): 721-727 (2006)Access Control Model for Secure XML Documents., , , and . ACIS-ICIS, page 352-357. IEEE Computer Society, (2005)Design of Translator for Stack-Based Codes from 3-Address Codes in CTOC., , and . ACIS-ICIS, page 32-36. IEEE Computer Society, (2005)Debugging of Java Programs Using HDT with Program Slicing., , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 524-533. Springer, (2004)