Author of the publication

Perimeter Defence Policy Model of Cascade MPLS VPN Networks.

, , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1026-1034. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D-GM-MAC with a Controlled Mobile Sink for AD-HOC WSN., , , and . IoTSMS, page 176-181. IEEE, (2018)3-D GM-MAC with Fixed Sensor Nodes for Stability Improvement., , , and . ICOIN, page 279-283. IEEE, (2019)Transmission Control for Future Internet including Error-prone Wireless Region., and . Int. J. Comput. Commun. Control, 7 (4): 759-766 (2012)Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing., , and . KSII Trans. Internet Inf. Syst., 14 (3): 943-961 (2020)Perimeter Defence Policy Model of Cascade MPLS VPN Networks., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1026-1034. Springer, (2004)Complete position synchronization in the power grid system., , and . Appl. Math. Lett., (2018)A 3-dimensional group management MAC scheme for mobile IoT devices in wireless sensor networks., , , and . J. Ambient Intell. Humaniz. Comput., 9 (4): 1223-1234 (2018)Design and performance analysis of a new RTM algorithm for VBR traffic in ATM networks., , and . Comput. Commun., 19 (3): 205-215 (1996)An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment., , , and . Secur. Commun. Networks, (2020)A Performance Evaluation of Vertical Handoff Scheme between IEEE 802.16e and cdma2000 Networks., , , , , , , and . Communications in Computing, page 104-109. CSREA Press, (2006)