Author of the publication

Network recovery strategies for maximization of network survivability.

, , , and . IWCMC, page 1130-1134. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks., , and . ICC, page 1722-1726. IEEE, (2008)An admission control algorithm for CDMA networks., , and . ICON, page 647-652. IEEE, (2003)Adaptive Load Balancing of a Cellular CDMA Systems Considering Non-uniform Traffic Distributions., and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 60-70. Springer, (2004)Near Optimal Secret Sharing for Information Leakage Maximization., , , and . IEA/AIE (3), volume 6098 of Lecture Notes in Computer Science, page 189-198. Springer, (2010)The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing., , , and . EUC, volume 4808 of Lecture Notes in Computer Science, page 432-443. Springer, (2007)An efficient time slot allocation algorithm in wireless networks., , and . WCNIS, page 322-328. IEEE, (2010)Survivability and performance optimization of mobile wireless communication networks in the event of base station failure., and . Comput. Electr. Eng., 32 (1-3): 50-64 (2006)Smart Fall Prediction for Elderly Care Using iPhone and Apple Watch., , , , , and . Wirel. Pers. Commun., 114 (1): 347-365 (2020)Backhaul and Routing Assignments with End-to-End QoS Constraints for Wireless Mesh Networks., , , and . Wireless Personal Communications, 53 (2): 211-233 (2010)A routing algorithm for virtual circuit data networks with multiple sessions per O - D pair., and . Networks, 22 (2): 185-208 (1992)