Author of the publication

Low complexity RRA versus other RRA schemes in the OFDMA downlink: A comparison.

, , and . VITAE, page 1-5. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coded spread slotted Aloha performance in a LEO satellite communication channel., and . PIMRC, page 422-426. (1996)Load balancing in the call admission control of heterogeneous wireless networks., , and . IWCMC, page 245-250. ACM, (2006)Performance Evaluation of the Wireless Tree Wi-Fi Video Surveillance System., , and . UKSim, page 511-516. IEEE, (2014)TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment., and . EUROCON, page 1-6. IEEE, (2015)Guest Editorial Column., , , , and . Wirel. Pers. Commun., 118 (3): 1821-1824 (2021)Fast Implementation of Block Motion Estimation Algorithms in Video Encoders., , , and . CCP, page 103-107. IEEE Computer Society, (2011)Mitigating cross-tier cross-boundary interference in fractional frequency reuse scheme for multi-tier networks., , and . AFRICON, page 1-6. IEEE, (2015)A Scalable QoS Guaranteeing Scheme for Scheduling IP Traffic., , and . Wireless and Optical Communications, page 162-167. IASTED/ACTA Press, (2006)Openphone User Engagement and Requirements Solicitation in Low Literacy Users., , , , , and . HCIS, volume 272 of IFIP, page 189-193. Springer, (2008)Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing., , , , and . CoRR, (2018)