Author of the publication

Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.

, , , , and . IET Commun., 3 (5): 764-771 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1., , , and . Intell. Autom. Soft Comput., 16 (4): 579-592 (2010)The prediction of network efficiency in the smart grid., , , , and . Electron. Commer. Res., 13 (3): 347-356 (2013)Area-efficient convolutional deinterleaver for mobile TV receiver., , and . ACM Trans. Embed. Comput. Syst., 12 (2): 28:1-28:12 (2013)Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks., , and . Wireless Personal Communications, 60 (3): 559-569 (2011)Research on android malware permission pattern using permission monitoring system., , and . Multimedia Tools Appl., 75 (22): 14807-14817 (2016)Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments., , , , and . IET Commun., 3 (5): 764-771 (2009)Simulation Model Design of a Security System Based on a Policy-Based Framework., and . Simulation, 79 (9): 515-527 (2003)Modeling and Simulation of Distributed Security Models., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 809-818. Springer, (2003)Distributed Security Agent Modeling in the Policy-Based Networking., and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 782-786. Springer, (2004)Modeling of Energy-efficient Applicable Routing Algorithm in WSN., , , and . JDCTA, 4 (5): 13-22 (2010)