From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks., , и . ICC, стр. 1722-1726. IEEE, (2008)An admission control algorithm for CDMA networks., , и . ICON, стр. 647-652. IEEE, (2003)Near Optimal Secret Sharing for Information Leakage Maximization., , , и . IEA/AIE (3), том 6098 из Lecture Notes in Computer Science, стр. 189-198. Springer, (2010)Adaptive Load Balancing of a Cellular CDMA Systems Considering Non-uniform Traffic Distributions., и . HiPC, том 3296 из Lecture Notes in Computer Science, стр. 60-70. Springer, (2004)The top load balanced forest routing in mesh networks., и . CCNC, стр. 468-472. IEEE, (2006)Minimum-Cost Multicast Routing for Multi-Layered Multimedia Distribution., и . MMNS, том 3271 из Lecture Notes in Computer Science, стр. 102-114. Springer, (2004)The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing., , , и . EUC, том 4808 из Lecture Notes in Computer Science, стр. 432-443. Springer, (2007)An efficient time slot allocation algorithm in wireless networks., , и . WCNIS, стр. 322-328. IEEE, (2010)Backhaul and Routing Assignments with End-to-End QoS Constraints for Wireless Mesh Networks., , , и . Wireless Personal Communications, 53 (2): 211-233 (2010)An On-Board Equipment and Blockchain-Based Automobile Insurance and Maintenance Platform., , , и . BWCCA, том 159 из Lecture Notes in Networks and Systems, стр. 223-232. Springer, (2020)