Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems., , , and . PDPTA, page 1229-1238. CSREA Press, (1997)A context-aware prefetching strategy for mobile computing environments., , , and . IWCMC, page 1109-1116. ACM, (2006)A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems., , and . Int. J. Comput. Simul., 4 (1): 65-88 (1994)A Message from the Incoming Editor-in-Chief.. J. Commun., 4 (1): 1-2 (2009)Game theoretic modeling of security and trust relationship in cyberspace., , and . Int. J. Commun. Syst., 29 (9): 1500-1512 (2016)Belief based data cleaning for wireless sensor networks., , and . Wirel. Commun. Mob. Comput., 12 (5): 406-419 (2012)Mobile Agents to Automate Fault Management in Wireless and Mobile Networks., , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 1296-1300. Springer, (2000)Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks., , and . ICWN, page 203-212. CSREA Press, (2005)Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , and . WCNC, page 3341-3346. IEEE, (2007)A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , and . Comput. Networks, 31 (1-2): 101-110 (1999)