From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Classification of Hidden Users' Profiles in Wireless Communications., , и . MONAMI, том 97 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-16. Springer, (2011)Multi-time-Scale Traffic Modeling Using Markovian and L-Systems Models., , , и . ECUMN, том 3262 из Lecture Notes in Computer Science, стр. 297-306. Springer, (2004)Predicting the quality of service of wireless LANs using neural networks., , и . MSWiM, стр. 52-60. ACM, (2006)A Quasi-realistic Internet Graph.. DCNET, стр. 27-32. SciTePress, (2017)Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph.. ICETE (Selected Papers), том 990 из Communications in Computer and Information Science, стр. 1-15. Springer, (2017)Localization system for wireless networks., , и . ICC Workshops, стр. 988-993. IEEE, (2013)Lightweight discovery and exchange of network information in distributed network management., , , , и . IM, стр. 740-743. IEEE, (2013)Local Area Network Modeling for Performance Prediction., , и . LCN, стр. 249-251. IEEE Computer Society, (2007)Joint Modeling of MANET Characteristics for QoS Prediction., , и . ISCC, стр. 429-435. IEEE Computer Society, (2007)Modeling Self-similar Traffic through Markov Modulated Poisson Processes over Multiple Time Scales., , , и . HSNMC, том 2720 из Lecture Notes in Computer Science, стр. 550-560. Springer, (2003)