Author of the publication

On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks.

, , and . IEEE Wirel. Commun. Lett., 2 (3): 331-334 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks., , and . IEEE Wirel. Commun. Lett., 2 (3): 331-334 (2013)Privacy-Preserving Experimentation with Sensibility Testbed., , and . login Usenix Mag., (2015)CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection., , , , , , and . J. Syst. Archit., (2022)Rough Sets: Visually Discerning Neurological Functionality During Thought Processes., , , , , and . ISMIS, volume 11177 of Lecture Notes in Computer Science, page 32-41. Springer, (2018)Four years experience: Making sensibility testbed work for SAS., , , and . SAS, page 1-6. IEEE, (2018)Distributed Systems in the Wild: The Theoretical Foundations and Experimental Perspectives., , , , and . 3PGCIC, page 87-94. IEEE, (2012)An Efficient Overlay Multicast Routing Algorithm for Real-Time Multimedia Applications., , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 829-836. Springer, (2007)Design of Two Interleaved Error Detection and Corrections using Hsiao Code and CRC., and . IECON, page 2261-2266. IEEE, (2020)BlurSense: Dynamic fine-grained access control for smartphone privacy., , , , and . SAS, page 329-332. IEEE, (2014)Evaluating Feature Robustness for Windows Malware Family Classification., , , and . ICCCN, page 1-10. IEEE, (2022)