Author of the publication

Analyzing Control Traffic Overhead versus Mobility and Data Traffic Activity in Mobile Ad-Hoc Network Protocols.

, , and . Wireless Networks, 10 (4): 447-455 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ultimate Characterizations of the Burst Response of an Interval Searching Algorithm: A Study of a Functional Equation., and . SIAM J. Comput., 18 (4): 777-791 (1989)OLSR performance measurement in a military mobile ad hoc network., , , , , , , , and . Ad Hoc Networks, 3 (5): 575-588 (2005)Adaptive Multiplicity Codes based PIR Protocol for Multi-Cloud Plateform Services., , and . 5G World Forum, page 99-105. IEEE, (2018)SecLoc: Encryption system based on compressive sensing measurements for location estimation., and . INFOCOM Workshops, page 171-172. IEEE, (2014)Broadcast Speedup in Vehicular Networks via Information Teleportation., , and . LCN, page 369-376. IEEE, (2018)Space-time information propagation in mobile ad hoc wireless networks.. ITW, page 260-264. IEEE, (2004)Analysis of a stack algorithm for CSMA-CD random length packet communication., and . IEEE Trans. Inf. Theory, 36 (2): 420-426 (1990)Analysis of digital tries with Markovian dependency., and . IEEE Trans. Inf. Theory, 37 (5): 1470-1475 (1991)What Can We Learn about Suffix Trees from Independent Tries?, and . WADS, volume 519 of Lecture Notes in Computer Science, page 228-239. Springer, (1991)Green Mining: toward a less energetic impact of cryptocurrencies., and . IACR Cryptology ePrint Archive, (2018)