From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks., , , , , и . IEEE Trans. Mob. Comput., 6 (6): 663-677 (2007)Augur: Modeling the Resource Requirements of ConvNets on Mobile Devices., , , , и . IEEE Trans. Mob. Comput., 20 (2): 352-365 (2021)Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows., , , и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 13 (1): 2-13 (2009)Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud., , , , , и . IEEE/ACM Trans. Netw., 27 (2): 560-576 (2019)On Progressive Network Recovery From Massive Failures Under Uncertainty., , , и . IEEE Trans. Netw. Serv. Manag., 16 (1): 113-126 (2019)TeamPhone: Networking Smartphones for Disaster Recovery., , и . CoRR, (2016)Sensor Mission Assignment in Rechargeable Wireless Sensor Networks., , , и . ACM Trans. Sens. Networks, 10 (4): 60:1-60:39 (2014)Splitter: Mining Fine-Grained Sequential Patterns in Semantic Trajectories., , , , и . Proc. VLDB Endow., 7 (9): 769-780 (2014)On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract., , , и . IoTDI, стр. 279-280. ACM, (2017)mMLSnet: Multilevel Security Network with Mobility., , , и . MILCOM, стр. 821-826. IEEE, (2023)