Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart wireless design scheme: fuzzy-logic routing and TDMA MAC protocol integration., , , , and . MOBIWAC, page 81-88. ACM, (2013)Study of multimedia variable bit rate video and voice sources over FDDI Networks., and . Broadband Islands, page 223-234. Elsevier, (1993)Backward Link Authentication For RFID tags., , and . RFID-TA, page 348-352. IEEE, (2011)A Study of Intelligent Multimedia Services over PSTNs and the Internet., , and . Services and Visualization: Towards User-Friendly Design, volume 1385 of Lecture Notes in Computer Science, page 250-264. Springer, (1998)Privacy Preserving k-Means Clustering in Multi-Party Environment., , and . SECRYPT, page 381-385. INSTICC Press, (2007)Rate adaptation algorithm for 802.11 networks: A dynamic decision approach., , and . WMNC, page 75-80. IEEE, (2012)Evaluation of the IEEE 802.11aa group addressed service for robust audio-video streaming., , and . ICC, page 6879-6884. IEEE, (2012)Citizen security using machine learning algorithms through open data., , , , and . LATINCOM, page 1-6. IEEE, (2016)New contention resolution schemes for WiMAX., , , and . WCNC, page 1736-1741. IEEE, (2009)Share-Based Congestion Control Scheme for Systems of Interconnected Networks., and . Comput. Commun., 18 (2): 79-88 (1995)