From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Routing Attacks in Mobile Ad Hoc Network., , , и . ICWN, стр. 552-558. CSREA Press, (2010)PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS, , и . International Journal of Next-Generation Networks (IJNGN), 10 (2): 15 (июня 2018)Indexing and weighting of multilingual and mixed documents., , и . SAICSIT, стр. 161-170. ACM, (2011)Approximation algorithms for minimizing the maximum lateness and makespan on parallel machines., , , и . Ann. Oper. Res., 285 (1): 369-395 (2020)A Comparison of Queuing Models for Handover Strategies in Cellular Mobile Telecommunication Systems., и . Asia International Conference on Modelling and Simulation, стр. 315-321. IEEE Computer Society, (2008)PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS, , , и . International Journal of Next-Generation Networks (IJNGN), 10 (1/2): 01 - 15 (июня 2018)Matching storage organisation to usage pattern in relational data bases.. Durham University, England, UK, (1974)British Library, EThOS.Reducing false positives through fuzzy alert correlation in collaborative intelligent intrusion detection systems - A review., и . FUZZ-IEEE, стр. 1-8. IEEE, (2010)Unrelated Parallel Machine Scheduling Problem with Precedence Constraints: Polyhedral Analysis and Branch-and-Cut., , , и . ISCO, том 9849 из Lecture Notes in Computer Science, стр. 308-319. Springer, (2016)CSPRSGs Strength Measures Based on the Classes of Transformation., и . AICCSA, стр. 499-. IEEE Computer Society, (2001)