Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks., , and . ICC, page 1722-1726. IEEE, (2008)An admission control algorithm for CDMA networks., , and . ICON, page 647-652. IEEE, (2003)The top load balanced forest routing in mesh networks., and . CCNC, page 468-472. IEEE, (2006)Relay Station Placement Strategy in IEEE 802.16j WiMAX Networks., , and . IEEE Trans. Commun., 59 (1): 151-158 (2011)Adaptive Load Balancing of a Cellular CDMA Systems Considering Non-uniform Traffic Distributions., and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 60-70. Springer, (2004)Near Optimal Secret Sharing for Information Leakage Maximization., , , and . IEA/AIE (3), volume 6098 of Lecture Notes in Computer Science, page 189-198. Springer, (2010)An efficient time slot allocation algorithm in wireless networks., , and . WCNIS, page 322-328. IEEE, (2010)The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing., , , and . EUC, volume 4808 of Lecture Notes in Computer Science, page 432-443. Springer, (2007)Survivability and performance optimization of mobile wireless communication networks in the event of base station failure., and . Comput. Electr. Eng., 32 (1-3): 50-64 (2006)Cost optimization of integrated network planning based on adaptive sectorization in hybrid F/CDMA telecommunications system via Lagrangean relaxation., , and . Expert Syst. Appl., 38 (12): 14819-14831 (2011)