Author of the publication

IP Video Streaming with Fine-Grained TCP-Friendly Rate Adaptation.

, , , and . MMNS, volume 2839 of Lecture Notes in Computer Science, page 18-31. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier., , , and . IEEE Access, (2021)A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks., , , , and . IEEE Internet Things J., 9 (18): 17425-17439 (2022)Power Allocation for Reliable SIC Detection of Rectangular QAM-based NOMA Systems., and . IEEE Trans. Veh. Technol., 70 (8): 8355-8360 (2021)An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification., , and . Comput. Syst. Sci. Eng., (2013)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 24 (11): 2127-2136 (2006)Phishing Detection: A Literature Survey., , and . IEEE Commun. Surv. Tutorials, 15 (4): 2091-2121 (2013)Grid-Controlled Lightpaths for High Performance Grid Applications., , , , and . J. Grid Comput., 1 (4): 387-394 (2003)A Trust and Reputation System for IoT Service Interactions., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2987-3005 (2022)