Author of the publication

A consolidation algorithm for multicast service using proportional control and neural network predictive techniques.

, , , and . Comput. Commun., 29 (1): 114-122 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cross-interface design for energy-efficient and delay-bounded multi-hop communications in IoT., , , , and . Ad Hoc Networks, (2018)Parallel autonomous optimization of demand response with renewable distributed generators., , and . SmartGridComm, page 55-60. IEEE, (2012)Dynamic scheduling of concurrent tasks with cost performance trade-off., , , and . CASES, page 103-109. ACM, (2000)Three-Dimensional Drone-Cell Deployment for Congestion Mitigation in Cellular Networks., , , , and . IEEE Trans. Vehicular Technology, 67 (10): 9867-9881 (2018)Automatic checkerboard detection for camera calibration using self-correlation., , , , , , , and . J. Electronic Imaging, 27 (03): 033014 (2018)Efficient and Fair Network Selection for Integrated Cellular and Drone-Cell Networks., , , , and . IEEE Trans. Vehicular Technology, 68 (1): 923-937 (2019)Context-aware multicast routing scheme for disruption tolerant networks., and . PE-WASUN, page 66-73. ACM, (2006)A Satisficing Conflict Resolution Approach for Multiple UAVs., , , , , , and . IEEE Internet of Things Journal, 6 (2): 1866-1878 (2019)Multivariable Finite-Time Control of 5 DOF Upper-Limb Exoskeleton Based on Linear Extended Observer., , , and . IEEE Access, (2018)Relations Among Notions of Security for Identity Based Encryption Schemes., , , , , , and . IACR Cryptology ePrint Archive, (2005)