Author of the publication

From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks.

, , , , , , , , and . MILCOM, page 1663-1668. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Epidemic-Dynamics-Based Model for CXPST Spreading in Inter-Domain Routing System., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 485-493. Springer, (2013)PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications., , , , , and . IEEE/ACM Trans. Netw., 30 (3): 1352-1367 (2022)TIPCB: A simple but effective part-based convolutional baseline for text-based person search., , , , and . Neurocomputing, (2022)Narrow optical filtering tolerance of 127-Gb/s DP-QPSK utilizing real-time DSP with 20 cascaded 50-GHz filters in the presence of 40, 200-ps/nm chromatic dispersion., , , , and . OFC/NFOEC, page 1-3. IEEE, (2013)A Security Threats Taxonomy for Routing System Intrusion Detection., , , and . CIS, page 267-270. IEEE Computer Society, (2016)Content classification and recommendation techniques for viewing electronic programming guide on a portable device, , , and . INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 21 (2): 375-395 (March 2007)International Workshop on Web Personalization, Recommender Systems and Intelligent User Interfaces, Reading, ENGLAND, OCT, 2005.Content Classification and Recommendation Techniques for Viewing Electronic Programming Guide on a Portable Device., , , and . Personalization Techniques and Recommender Systems, volume 70 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2008)A framework for analyzing DNA methylation data from Illumina Infinium HumanMethylation450 BeadChip., , and . BMC Bioinform., 19-S (5): 15-22 (2018)A Flexible and Efficient Approach to Component Test in Time-Critical Scenarios., , and . ICSR, volume 11602 of Lecture Notes in Computer Science, page 3-13. Springer, (2019)Monitoring of Root Privilege Escalation in Android Kernel., , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 491-503. Springer, (2018)