From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Enhancement for a Low Computation Cost User Authentication Scheme., , и . SECRYPT, стр. 5-8. INSTICC Press, (2006)Parallel Mining of Association Rules from Gene Expression Databases., , и . FSKD (3), стр. 68-73. IEEE Computer Society, (2007)0-7695-2874-0.Improved User Identity Confidentiality for UMTS Mobile Networks., , и . ECUMN, стр. 401-409. IEEE Computer Society, (2007)Now or later?: delaying data transfer in time-critical aerial communication., , , , и . CoNEXT, стр. 127-132. ACM, (2013)Route or Carry: Motion-Driven Packet Forwarding in Micro Aerial Vehicle Networks., , , и . IEEE Trans. Mob. Comput., 16 (3): 843-856 (2017)Characterizing 802.11n aerial communication., , , и . ANC@MobiHoc, стр. 7-12. ACM, (2013)From ground to aerial communication: dissecting WLAN 802.11n for the drones., , и . WiNTECH@MobiCom, стр. 25-32. ACM, (2013)Demo abstract: networking algorithms on a resource-limited distributed mobile embedded system., и . IPSN, стр. 301-302. ACM, (2013)Scalable, privacy preserving radio-frequency identification protocol for the internet of things., и . Concurr. Comput. Pract. Exp., 27 (8): 1932-1950 (2015)Routing in a fleet of micro aerial vehicles: first experimental insights., , , и . AIRBORNE@MobiHoc, стр. 9-10. ACM, (2014)