Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Projection Onto Convex Sets with Watermarking for Error Concealment., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 119-127. Springer, (2007)Packet-Size Optimization for Multiple-Input Multiple-Output Cognitive Radio Sensor Networks-Aided Internet of Things., , , , and . IEEE Access, (2017)Distributed Velocity-Dependent Protocol for Multihop Cellular Sensor Networks., , , and . EURASIP J. Wireless Comm. and Networking, (2009)A Realistic Weighted Clustering algorithm for data gathering in single hop cell phone based sensor network., , , and . GLOBECOM Workshops, page 1253-1257. IEEE, (2011)Cognitive Relaying with Frequency Incentive for Multiple Primary Users., , , and . Wireless Personal Communications, 74 (1): 167-187 (2014)Error Concealment Using Digital Watermarking., , , , , , and . APCCAS, page 1713-1716. IEEE, (2006)PULRP: Path Unaware Layered Routing Protocol for Underwater Sensor Networks., , , , and . ICC, page 3141-3145. IEEE, (2008)Hardware efficient recursive VLSI architecture for multilevel lifting 2-D DWT., , , and . ISCAS, page 1014-1017. IEEE, (2012)Multi-armed Bandits with Constrained Arms and Hidden States., , , and . CoRR, (2017)tuPOY: Epitomizing a New Epoch in Communications With Polymer Textiles., , , and . Proc. IEEE, 100 (11): 3079-3098 (2012)