From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Involuntary Information Leakage in Social Network Services., , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 167-183. Springer, (2008)On Using Probabilistic Forwarding to Improve HEC-Based Data Forwarding in Opportunistic Networks., , и . EUC, том 4808 из Lecture Notes in Computer Science, стр. 101-112. Springer, (2007)A hybrid routing approach for opportunistic networks., , , , и . CHANTS@SIGCOMM, стр. 213-220. ACM, (2006)End-to-End Asymmetric Link Capacity Estimation., , , , и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 780-791. Springer, (2005)Measuring effective capacity of IEEE 802.15.4 beaconless mode., , , , и . WCNC, стр. 493-498. IEEE, (2006)Modeling Channel Conflict Probabilities between IEEE 802.15 based Wireless Personal Area Networks., , и . ICC, стр. 343-348. IEEE, (2006)Design and implementation of IoT-enabled personal air quality assistant on instant messenger., , , и . MEDES, стр. 165-170. ACM, (2018)USHA: a practical vertical handoff solution., , и . MSAN, стр. 83-87. IEEE, (2015)Demo: A SDR-Based Indoor Localization System for Mobile Devices., , , и . MobiSys (Companion Volume), стр. 95. ACM, (2016)Fine-grained time synchronization for mission-critical DTSNs., , , , , , , , и . INSS, стр. 1-2. IEEE, (2012)