Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utility Based Short-term Throughput Driven Scheduling Approach for Efficient Resource Allocation in CDMA Wireless Networks., and . Wireless Personal Communications, 52 (3): 517-535 (2010)Temporal Dynamics of Information Diffusion in Twitter: Modeling and Experimentation., , , and . IEEE Trans. Comput. Social Systems, 5 (1): 256-264 (2018)On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks., , and . ICC, page 1130-1135. IEEE, (2007)Fuzzy Multi-Criteria Based Trust Management in Heterogeneous Federated Future Internet Testbeds., , , and . Future Internet, 10 (7): 58 (2018)Design and Assessment of a Reputation-Based Trust Framework in Wireless Testbeds Utilizing User Experience., , , and . ADHOC-NOW, volume 7960 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation., , and . EURASIP J. Wireless Comm. and Networking, (2019)Strategy evolution of information diffusion under time-varying user behavior in generalized networks., , , and . Comput. Commun., (2017)Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies., and . Comput. Commun., 29 (10): 1627-1638 (2006)Game theoretic distributed uplink power control for CDMA networks with real-time services., and . Comput. Commun., 32 (2): 376-385 (2009)Mobile agent-based approach for efficient network management and resource allocation: framework and applications., , , and . IEEE J. Sel. Areas Commun., 20 (4): 858-872 (2002)