Author of the publication

A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention.

, and . IEEE Trans. Mob. Comput., 10 (2): 191-204 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capturing Cognitive Fingerprints from Keystroke Dynamics., , , , , , , , , and . IT Prof., 15 (4): 24-28 (2013)Enhanced high-performance distributed coordination function for IEEE 802.11 multi-rate LANs., , , and . Int. J. Commun. Syst., 22 (8): 1045-1061 (2009)QoS-Aware Energy-Efficient Association and Resource Scheduling for HetNets., and . IEEE Trans. Veh. Technol., 67 (1): 650-664 (2018)Locally Differentially Private Distributed Deep Learning via Knowledge Distillation., , and . CoRR, (2022)Fair Demand Response With Electric Vehicles for the Cloud Based Energy Management Service., and . IEEE Trans. Smart Grid, 9 (1): 458-468 (2018)A Performance Analysis of the Active Memory System., , and . ICCD, page 493-496. IEEE Computer Society, (2001)Spectrum-Energy Efficiency Optimization for Downlink LTE-A for Heterogeneous Networks., and . IEEE Trans. Mob. Comput., 16 (5): 1449-1461 (2017)Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis., and . CoRR, (2018)Java Bytecode Optimization with Advanced Instruction Folding Mechanism., and . ISHPC, volume 1940 of Lecture Notes in Computer Science, page 268-275. Springer, (2000)APN model construction for malicious email detection., , , and . Expert Syst. Appl., 42 (13): 5696-5704 (2015)