Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FULL-RCMA: a high utilization EPON., , , and . IEEE J. Sel. Areas Commun., 22 (8): 1514-1524 (2004)Throughput Analysis and User Barring Design for Uplink NOMA-Enabled Random Access., , , , and . CoRR, (2020)TC-BAC: A trust and centrality degree based access control model in wireless sensor networks., , , and . Ad Hoc Networks, 11 (8): 2675-2692 (2013)A distributed sleep mechanism for energy-efficiency in non-beacon-enabled IEEE 802.15.4 networks., , , and . CAMAD, page 237-241. IEEE, (2015)An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications., , , , and . IEEE Internet of Things Journal, 1 (1): 58-69 (2014)Distributed routing algorithm for low-latency broadcasting in multi-rate wireless mesh network., , and . IWCMC, page 338-342. ACM, (2009)Cooperative Retransmissions through Collisions., , and . ICC, page 1-5. IEEE, (2011)Joint Unequal Loss Protection and LT Coding for Layer-Coded Media Delivery., , and . GLOBECOM, page 1-5. IEEE, (2010)Dynamic scheduling of a mixture of scalable IPTV and VoD traffic over wireless home networks., , , and . MUM, page 123-126. ACM, (2011)Dynamic Scheduler Management Using Deep Learning., , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (2): 575-585 (2020)