Author of the publication

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.

, , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 353-364. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to Special Issue on Misinformation, Fake News and Rumor Detection in Low-Resource Languages., , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 21 (1): 1e:1-1e:3 (2022)A federated interoperability architecture for health information systems., , , , and . Int. J. Internet Protoc. Technol., 7 (4): 189-202 (2013)Evidence and Forensics in the Cloud: Challenges and Future Research Directions., , and . IEEE Cloud Comput., 4 (3): 14-19 (2017)Cloud Manufacturing: Security, Privacy, and Forensic Concerns., , , and . IEEE Cloud Comput., 3 (4): 16-22 (2016)Live Migration in Emerging Cloud Paradigms., , , and . IEEE Cloud Comput., 3 (2): 12-19 (2016)Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms., , , , and . IEEE Access, (2019)Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence., , , , and . IEEE Internet Things J., 5 (3): 1679-1689 (2018)CNN-based anti-spoofing two-tier multi-factor authentication system., , , , , , , and . Pattern Recognit. Lett., (2019)An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications., , , , , and . IEEE Trans. Ind. Informatics, 15 (7): 4266-4275 (2019)Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet., , and . IEEE/ACM Trans. Netw., 22 (1): 230-243 (2014)