From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security vulnerabilities of connected vehicle streams and their impact on cooperative driving., , , , , , и . IEEE Commun. Mag., 53 (6): 126-132 (2015)Parallel architectures for processing high speed network signaling protocols., , и . IEEE/ACM Trans. Netw., 3 (6): 716-728 (1995)Model Predictive Congestion Control for TCP Endpoints., , и . CoRR, (2020)Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks., , , и . Mob. Networks Appl., 21 (3): 523-538 (2016)A Compatibility Vector Technique for Cooperative Scheduling and Channel Assignment Algorithm in Broadband Wireless Networks., , , , и . Mob. Networks Appl., 22 (4): 730-742 (2017)TempMesh - A Flexible Wireless Sensor Network for Monitoring River Temperatures., , , , , , и . ACM Trans. Sens. Networks, 19 (1): 15:1-15:28 (февраля 2023)A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers., , , , и . Networking, стр. 253-261. IEEE, (2020)Distributed target tracking and boundary estimation in wireless sensor networks., , и . Int. J. Auton. Adapt. Commun. Syst., 1 (3): 308-331 (2008)Performance Evaluation of an Efficient Multiple Copy Update Algorithm., и . IEEE Trans. Parallel Distributed Syst., 5 (2): 217-224 (1994)Performance Evaluation of a Dataflow Architecture., и . IEEE Trans. Computers, 39 (5): 615-627 (1990)