Author of the publication

On the impact of wireless multimedia network for multi-modal activity recognition.

, , and . ISCC, page 1-6. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trinity: Internet Routing Policies, Internet Latencies and Triangle Inequality Violations.. International Conference on Internet Computing, page 191-199. CSREA Press, (2007)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System., , , , , , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 313-325. Springer, (2009)A survey and comparison of peer-to-peer overlay network schemes., , , , and . IEEE Commun. Surv. Tutorials, 7 (1-4): 72-93 (2005)Relay Probability Characteristics in a Social Ad-Hoc Network with Different Intimacy Calculation Models and Social Network Structure Models., , and . BlackSeaCom, page 1-5. IEEE, (2018)A Method of Constructing QoS Overlay Network and Its Evaluation., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)On the impact of wireless multimedia network for multi-modal activity recognition., , and . ISCC, page 1-6. IEEE Computer Society, (2014)Efficient Timeout Checking Mechanism for Traffic Control., , , and . ICCCN, page 327-333. IEEE, (2007)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)