From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data security in ad hoc networks using multipath routing., и . PIMRC, стр. 1331-1335. IEEE, (2003)Security equipment in ad hoc networks., и . VTC Spring, стр. 1819-1823. IEEE, (2002)Call Admission Control in Small Cell Networks with Retrials and Guard Channels., , , и . GLOBECOM, стр. 1-6. IEEE, (2016)An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks., , и . ICC, стр. 1-6. IEEE, (2011)On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs., , и . ICC, стр. 1-6. IEEE, (2017)Detecting DoS attacks in WSN based on clustering technique., , , и . WCNC, стр. 2214-2219. IEEE, (2013)New User Association Scheme Based on Multi-Objective Optimization for 5G Ultra-Dense Multi-RAT HetNets., , , и . ICC, стр. 1-6. IEEE, (2018)A game-theoretic approach for non-overlapping communities detection., , , и . IWCMC, стр. 1315-1320. IEEE, (2017)Coalitional game-based behavior analysis for spectrum access in cognitive radios., , , , и . Wirel. Commun. Mob. Comput., 16 (14): 1910-1921 (2016)Towards an efficient failure detection in MANETs., , , и . Wirel. Commun. Mob. Comput., 16 (17): 2939-2955 (2016)