Author of the publication

Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks.

, , and . CAINE, page 250-254. ISCA, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JHelioviewer: Visualizing Large Sets of Solar Images Using JPEG 2000., , , , , , , , , and . Comput. Sci. Eng., 11 (5): 38-47 (2009)Formal Verification of a Simple Automated Negotiation Protocol., , and . Software Engineering Research and Practice, page 650-656. CSREA Press, (2006)Middleware for large distributed systems and organizations., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 536-542. Trinity College Dublin, (2003)Algorithms and performance analysis for path navigation of Ackerman-steered autonomous robots., , , and . PerMIS, page 230-235. ACM, (2008)Applying Game Theoretic Techniques to Improve the Accuracy of Tree-based Classification Results., , and . ISSPIT, page 314-319. IEEE, (2018)Golden Hour: A Game-Based Simulation Environment., , and . International Conference on Internet Computing, page 147-152. CSREA Press, (2007)A Service Oriented Architecture Complexity Metric, Based on Statistical Hypothesis Testing., and . Software Engineering Research and Practice, page 214-220. CSREA Press, (2008)Analysis of a novel docking technique for autonomous robots., , , and . PerMIS, page 220-223. ACM, (2008)Development of an Efficient Network Intrusion Detection Model Using Extreme Gradient Boosting (XGBoost) on the UNSW-NB15 Dataset., , , and . ISSPIT, page 1-7. IEEE, (2019)An efficient prefetching strategy for remote browsing of JPEG 2000 image sequences., , , , and . WIAMIS, page 1-4. IEEE, (2010)