Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of WiMAX Networks AC., , and . Wireless Personal Communications, 74 (1): 133-146 (2014)Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks., and . International Conference on Wireless Networks, page 144-150. CSREA Press, (2004)Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks., , and . GLOBECOM, page 1652-1656. IEEE, (2008)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)Coalitional game-based behavior analysis for spectrum access in cognitive radios., , , , and . Wirel. Commun. Mob. Comput., 16 (14): 1910-1921 (2016)Towards an efficient failure detection in MANETs., , , and . Wirel. Commun. Mob. Comput., 16 (17): 2939-2955 (2016)CONTVERB: Continuous Virtual Emotion Recognition Using Replaceable Barriers for Intelligent Emotion-Based IoT Services and Applications., , , and . IEEE Netw., 34 (5): 269-275 (2020)Detecting DoS attacks in WSN based on clustering technique., , , and . WCNC, page 2214-2219. IEEE, (2013)Data security in ad hoc networks using multipath routing., and . PIMRC, page 1331-1335. IEEE, (2003)