Author of the publication

Active buffer management algorithm for silence suppressed voice applications.

, , , , , , and . MILCOM, page 1-4. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Active Buffer Management Scheme using Virtual Transmission Delay in the IEEE 802.11e Network., , and . CCNC, page 1-2. IEEE, (2010)Optimizing resource allocation for elastic security VNFs in the SDNFV-enabled cloud computing., , , , and . ICOIN, page 163-166. IEEE, (2017)End-to-End Wireless Performance Simulator: Modelling Methodology and Performance., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 258-267. Springer, (2005)Active buffer management algorithm for silence suppressed voice applications., , , , , , and . MILCOM, page 1-4. IEEE, (2012)HOT MWIR Detector Development with InAs/InAsSb T2SL nBn Structure., , , and . ICEIC, page 1-2. IEEE, (2021)An Effective Bandwidth Based Admission Control for Multimedia Service in WLAN., and . MILCOM, page 1003-1008. IEEE, (2014)Large Neighborhood Search Using Constraint Satisfaction Techniques in Vehicle Routing Problem., , , and . Canadian AI, volume 5549 of Lecture Notes in Computer Science, page 229-232. Springer, (2009)Decision Point of AAL2 Multiplexing for Voice and Data Services in 3G WCDMA Network., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 524-533. Springer, (2004)Magic mirror: a new VR platform design and its applications., , and . Advances in Computer Entertainment Technology, page 343-348. ACM, (2004)A Delay-Based Piggyback Scheme in IEEE 802.11., , and . WCNC, page 447-451. IEEE, (2007)