Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable resources brokering scheme in wireless grids based on non-cooperative bargaining game., , and . J. Netw. Comput. Appl., (2014)A taxonomy of application scheduling tools for high performance cluster computing., , , , and . Clust. Comput., 9 (3): 355-371 (2006)An Evaluation of the 6TiSCH Distributed Resource Management Mode., , , and . ACM Trans. Internet Things, 1 (4): 23:1-23:31 (2020)R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations., , and . AsiaCCS, page 247-254. ACM, (2019)A linear time recognition algorithm for proper interval graphs., and . Inf. Process. Lett., 87 (3): 153-161 (2003)Hierarchical syntactic models for human activity recognition through mobility traces., , , and . Pers. Ubiquitous Comput., 24 (4): 451-464 (2020)Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies., , , , , and . J. Ambient Intell. Humaniz. Comput., 5 (3): 323-339 (2014)A Comprehensive Review of Available Battery Datasets, RUL Prediction Approaches, and Advanced Battery Management., , , , , , , , , and 2 other author(s). IEEE Access, (2021)Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication., , , , , and . Ad Hoc Networks, (2015)Channel Assignment Strategies for Multiradio Wireless Mesh Networks: Issues and Solutions., , , and . IEEE Communications Magazine, 45 (11): 86-95 (2007)