Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks., , and . ICWN, page 203-212. CSREA Press, (2005)A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments., , and . RIDE, page 63-70. IEEE Computer Society, (2000)Providing Performance Guarantees for Buffered Crossbar Switches without Speedup., , , and . QSHINE, volume 22 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 297-314. Springer, (2009)An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks., , , and . ICCCN, page 865-873. IEEE Computer Society, (1998)An Efficient Solution To The Critical Section Problem In Distributed Systems., , and . ICPP (2), page 77-80. CRC Press, (1994)An Efficient Distributed Mutual Exclusion Algorithm., , , , and . ICPP, Vol. 1, page 196-203. IEEE Computer Society, (1996)A modular methodology to verify communication protocols., and . Comput. Commun., 20 (12): 1069-1077 (1997)A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , and . Comput. Networks, 31 (1-2): 101-110 (1999)Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , and . WCNC, page 3341-3346. IEEE, (2007)Game theoretic modeling of security and trust relationship in cyberspace., , and . Int. J. Commun. Syst., 29 (9): 1500-1512 (2016)