Author of the publication

Providing quality of service in mobile environments with MIR (Mobile IP Reservation Protocol).

, , and . ICON, page 24-29. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-spectral efficiency trade-off optimization for downlink multi-user non orthogonal multiple access systems., , and . Int. J. Commun. Syst., (2021)Multi-Channel Cognitive Radio Ad Hoc Networks., , , , , and . IEEE Commun. Mag., 56 (4): 134-135 (2018)Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks., and . MSWiM, page 73-79. ACM, (2014)Solution of detecting jamming attacks in vehicle ad hoc networks., , and . MSWiM, page 405-410. ACM, (2013)Interference-aware Congestion Control Protocol for Wireless Sensor Networks., , , , , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 181-188. Elsevier, (2014)Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor Network., , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 299-309. Springer, (2020)Channel allocation strategies in opportunistic-based cognitive networks., , , and . IWCMC, page 872-877. IEEE, (2012)Graph-Based MDP to Mobile Source with Energy Harvesting in Delay Tolerant Networks System., , , and . GLOBECOM, page 1-6. IEEE, (2017)A Decentralized Control of Autonomous Delay Tolerant Networks: Multi Agents Markov Decision Processes Framework., , and . ICC, page 1-6. IEEE, (2018)DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks., , and . Perform. Evaluation, (2015)