Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey., and . IEEE Commun. Surv. Tutorials, 14 (2): 279-298 (2012)A random early demotion and promotion marker for assured services., , , and . IEEE J. Sel. Areas Commun., 18 (12): 2640-2650 (2000)WebGraph: a framework for managing and improving performance of dynamic Web content., and . IEEE J. Sel. Areas Commun., 20 (7): 1414-1425 (2002)Your Installed Apps Reveal Your Gender and More!, , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 18 (3): 55-61 (2014)Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks., , , and . IEEE Trans. Inf. Forensics Secur., 8 (9): 1497-1507 (2013)Live Video Forensics: Source Identification in Lossy Wireless Networks., , , and . IEEE Trans. Inf. Forensics Secur., 10 (1): 28-39 (2015)On Availability-Performability Tradeoff in Wireless Mesh Networks., , and . IEEE Trans. Mob. Comput., 14 (3): 606-618 (2015)Recommendation Systems for Markets with Two Sided Preferences., , and . ICMLA, page 282-287. IEEE, (2014)Jamming-Resistant Communication: Channel Surfing without Negotiation., , and . ICC, page 1-6. IEEE, (2010)RSS-Ratio for enhancing performance of RSS-based applications., , , , and . INFOCOM, page 3075-3083. IEEE, (2013)