Author of the publication

A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach.

, , and . JDCTA, 4 (5): 112-117 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach., , and . JDCTA, 4 (5): 112-117 (2010)RUN: Residual U-Net for Computer-Aided Detection of Pulmonary Nodules without Candidate Selection., , , , and . CoRR, (2018)An Improved Certificateless Signature Scheme Secure in the Standard Model., , and . Fundam. Informaticae, 88 (1-2): 193-206 (2008)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Informaticae, 107 (1): 105-109 (2011)Iterative tighter nonparallel hyperplane support vector clustering with simultaneous feature selection., , and . Clust. Comput., 22 (Supplement): 8035-8049 (2019)Managing an Information System Transformation in Higher Educational Institutions: A Case Study on CMC Portal in Ghana., , and . Int. J. Emerg. Technol. Learn., 14 (22): 232-251 (2019)An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet., , , and . Int. J. Netw. Secur., 19 (6): 940-949 (2017)Distributing the Keys into P2P Network., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 460-463. Springer, (2003)Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing., , , , and . IEEE Access, (2018)Proxy Re-Encryption in Access Control Framework of Information-Centric Networks., , and . IEEE Access, (2019)