Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks., and . International Conference on Wireless Networks, page 144-150. CSREA Press, (2004)A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks., , and . GLOBECOM, page 1652-1656. IEEE, (2008)Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)A game-theoretic approach for non-overlapping communities detection., , , and . IWCMC, page 1315-1320. IEEE, (2017)Detecting DoS attacks in WSN based on clustering technique., , , and . WCNC, page 2214-2219. IEEE, (2013)New User Association Scheme Based on Multi-Objective Optimization for 5G Ultra-Dense Multi-RAT HetNets., , , and . ICC, page 1-6. IEEE, (2018)Dynamic power control for energy harvesting wireless multimedia sensor networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)UAV for Energy-Efficient IoT Communications: Matching Game Approach., , , and . GLOBECOM, page 1-6. IEEE, (2019)A multi-service MAC protocol in a multi-channel CSMA/CA for IEEE 802.11 networks., , and . J. Commun. Networks, 10 (3): 287-296 (2008)Admission control mechanism and performance analysis based on stochastic automata networks formalism., and . J. Parallel Distributed Comput., 71 (4): 594-602 (2011)