Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interference Mitigation based on NOMA for Scheduling Algorithm in V2X Environments., , , and . IWCMC, page 1952-1957. IEEE, (2020)User admission maximization based on ressource allocation in wireless networks., , , , and . ICC, page 1-6. IEEE, (2016)Optimizing handover decision and target selection in LTE-A network-based on MIH protocol., , , and . ICC, page 299-304. IEEE, (2014)End-to-end delay distribution in wireless heterogeneous networks., , , , and . ICC, page 2969-2973. IEEE, (2013)An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2018)Markov model-based adaptive CAC scheme for 3GPP LTE femtocell networks., , , and . ICC, page 6924-6928. IEEE, (2015)HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks., , , , and . WINSYS, page 84-93. SciTePress, (2016)Dual Metric scheduling based on Quality of service and Power Control for network assisted D2D communications., , , and . IWCMC, page 874-879. IEEE, (2018)Ultra Reliable Communication : Availability Analysis in 5G Cellular Networks., , and . PDCAT, page 96-102. IEEE, (2019)HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol., , , , and . SIMULTECH, page 404-411. SciTePress, (2013)