Author of the publication

Challenges in the Development of Mobile P2P Applications and Services

, , , , and . Vietname Journal on Information and Communication Technologies, (August 2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Combined Algorithm of Kalman Estimator and Guard Interval Optimization for Mobile WiMAX., , , and . Int. J. Distributed Syst. Technol., 4 (1): 16-28 (2013)An Optimal Algorithm of Estimation Channel Combining Kalman Filter with Adaptive Guard Interval for Mobile WiMAX Standard., , , and . RIVF, page 1-4. IEEE, (2012)Improving Efficiency of Web Application Firewall to Detect Code Injection Attacks with Random Forest Method and Analysis Attributes HTTP Request.. Program. Comput. Softw., 46 (5): 351-361 (2020)Challenges in the Development of Mobile P2P Applications and Services, , , , and . Vietname Journal on Information and Communication Technologies, (August 2009)Challenges in the Development of Mobile P2P Applications and Services, , , , and . Vietname Journal on Information and Communication Technologies, (August 2009)Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs., and . ICLP, volume 3668 of Lecture Notes in Computer Science, page 311-325. Springer, (2005)Polytool: Proving Termination Automatically Based on Polynomial Interpretations., and . LOPSTR, volume 4407 of Lecture Notes in Computer Science, page 210-218. Springer, (2006)A method for estimating text neck while walking using a 3-axis accelerometer., , , and . BSN, page 23-26. IEEE, (2017)Challenges in the Development of Mobile P2P Applications and Services, , , , and . Vietname Journal on Information and Communication Technologies, (August 2009)BKCAS: a distributed context-aware pervasive information system to support user roaming., , , , , and . IJISTA, 9 (3/4): 316-325 (2010)