Author of the publication

Analysis of the Optimal Cooperation Scope of Bandwidth Sharing in vehicular networks.

, , , and . ITST, page 62-67. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks., , and . J. Syst. Softw., 82 (9): 1526-1539 (2009)The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks., , and . Comput. J., 65 (8): 1977-1997 (2022)A MEC-Assisted Method for Early Handover Using the Fully Distributed Mobility Management (MEC-F-DMM) Architecture., , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 737-750. Springer, (2019)A Channel Selection Method for Device to Device (D2D) Communication Using the Mobile Edge Computing (MEC) Paradigm., , and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 173-182. Springer, (2018)The Vehicular Social Network (VSN)-Based Sharing of Downloaded Geo Data Using the Credit-Based Clustering Scheme., , , and . IEEE Access, (2018)A proxy-based adaptive flow control scheme for media streaming., , and . SAC, page 750-754. ACM, (2002)The Mobile Edge Computing (MEC)-Based VANET Data Offloading Using the Staying-Time-Oriented k-Hop Away Offloading Agent., , and . ICOIN, page 357-362. IEEE, (2019)The Social Internet of Thing (S-IOT)-Based Mobile Group Handoff Architecture and Schemes for Proximity Service., , , and . IEEE Trans. Emerg. Top. Comput., 5 (3): 425-437 (2017)CTW: an integrated computer and telephone-accessed WWW system., , and . Softw. Pract. Exp., 30 (13): 1485-1507 (2000)A new approach to generate weighted fuzzy rules using genetic algorithms for estimating null values., and . Expert Syst. Appl., 35 (3): 905-917 (2008)