Author of the publication

Proposal of Connectivity Support Methods with Autonomous Flight Wireless Nodes for Never Die Network.

, , , and . NBiS, page 387-392. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Encoding Bit Rates on User Level QoS for Video Streaming., , , , , and . EuroIMSA, page 41-46. IASTED/ACTA Press, (2005)Development of a Monitoring System Based on Power Consumption., , , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 363-372. Springer, (2017)Integrated Support Environment for Concurrent Process Calculi., , and . PODC, page 395. ACM, (1994)An Efficient Flow Control Approach For TCP Over Wireless Networks., , and . Journal of Circuits, Systems, and Computers, 13 (2): 341-360 (2004)A Computing Model to Bridge a Gap between Real Space and Web Space., , , , and . WEBIST (3), page 107-112. INSTICC Press, (2007)An Intelligent LOTOS interpreter in AMLOG., , and . ICLP Workshop: Applications of Logic Programming to Software Engineering, (1994)Knowledge Circulation Framework for Flexible Multimedia Communication Services., , and . IEICE Trans. Inf. Syst., 88-D (9): 2059-2066 (2005)A New Specification Environment for Communication Systems Based on Specification Reuse by the Application of Case Based Reasoning., , , and . IEICE Trans. Inf. Syst., 78-D (10): 1269-1281 (1995)Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks., , , , , and . CoRR, (2014)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 305-316. Springer, (2019)