Author of the publication

Statistical properties of MPEG video traffic and their impact on bandwidth allocation in wireless ATM networks.

, , and . WCNC, page 998-1002. IEEE, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification., , and . Comput. Syst. Sci. Eng., (2013)Phishing Detection: A Literature Survey., , and . IEEE Commun. Surv. Tutorials, 15 (4): 2091-2121 (2013)Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 24 (11): 2127-2136 (2006)Power Allocation for Reliable SIC Detection of Rectangular QAM-based NOMA Systems., and . IEEE Trans. Veh. Technol., 70 (8): 8355-8360 (2021)An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier., , , and . IEEE Access, (2021)A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks., , , , and . IEEE Internet Things J., 9 (18): 17425-17439 (2022)A Trust and Reputation System for IoT Service Interactions., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2987-3005 (2022)A State-of-the-Art Review of Cloud Forensics., , and . J. Digit. Forensics Secur. Law, 9 (4): 7-28 (2014)Grid-Controlled Lightpaths for High Performance Grid Applications., , , , and . J. Grid Comput., 1 (4): 387-394 (2003)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)